CVE-2025-1924

8.2 HIGH

📋 TL;DR

A vulnerability in Yokogawa's Vnet/IP Interface Package allows attackers to cause denial of service or execute arbitrary code by sending maliciously crafted packets. This affects industrial control systems using CENTUM VP R6 and R7 with the vulnerable interface package. Organizations using these Yokogawa industrial automation products are at risk.

💻 Affected Systems

Products:
  • Vnet/IP Interface Package for CENTUM VP R6 VP6C3300
  • Vnet/IP Interface Package for CENTUM VP R7 VP7C3300
Versions: R1.07.00 or earlier
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific Yokogawa industrial control system components used in process automation environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, process disruption, and potential safety incidents in industrial environments.

🟠

Likely Case

Denial of service causing Vnet/IP communication failure, disrupting industrial control operations and potentially halting production processes.

🟢

If Mitigated

Limited impact with proper network segmentation and packet filtering, potentially only causing temporary communication interruptions.

🌐 Internet-Facing: LOW (Industrial control systems should never be directly internet-facing)
🏢 Internal Only: HIGH (Attackers with internal network access can exploit this to disrupt critical industrial operations)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to vulnerable systems and ability to craft malicious packets. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R1.08.00 or later

Vendor Advisory: https://web-material3.yokogawa.com/1/39281/files/YSAR-26-0002-E.pdf

Restart Required: No

Instructions:

1. Download updated Vnet/IP Interface Package from Yokogawa support portal. 2. Follow vendor installation instructions for CENTUM VP systems. 3. Verify successful installation and test communication functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Vnet/IP networks from general corporate networks using firewalls and VLANs

Packet Filtering

all

Implement firewall rules to restrict access to Vnet/IP ports from unauthorized sources

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Vnet/IP networks
  • Deploy intrusion detection systems to monitor for malicious packet patterns

🔍 How to Verify

Check if Vulnerable:

Check Vnet/IP Interface Package version in CENTUM VP system configuration or contact Yokogawa support

Check Version:

Check through CENTUM VP system configuration interface or Yokogawa diagnostic tools

Verify Fix Applied:

Verify Vnet/IP Interface Package version is R1.08.00 or later and test communication functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual Vnet/IP communication errors
  • Interface package crashes or restarts
  • Failed communication attempts from unknown sources

Network Indicators:

  • Malformed packets to Vnet/IP ports
  • Unusual traffic patterns to industrial control network segments

SIEM Query:

source="industrial_network" AND (event_type="communication_failure" OR packet_size>threshold)

🔗 References

📤 Share & Export