CVE-2025-48021

6.5 MEDIUM

📋 TL;DR

A vulnerability in Yokogawa's Vnet/IP Interface Package allows remote attackers to cause denial of service by sending maliciously crafted packets, which can terminate the Vnet/IP software stack process. This affects industrial control systems using CENTUM VP R6 and R7 with the vulnerable interface package. Organizations using these Yokogawa industrial automation products are at risk.

💻 Affected Systems

Products:
  • Vnet/IP Interface Package for CENTUM VP R6 VP6C3300
  • Vnet/IP Interface Package for CENTUM VP R7 VP7C3300
Versions: R1.07.00 and earlier
Operating Systems: Windows (typically Windows 7/10/Server 2012/2016 for CENTUM VP systems)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with Vnet/IP Interface Package installed; requires network access to the Vnet/IP interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of industrial control system communications leading to process shutdown, production loss, or safety system impairment in critical infrastructure environments.

🟠

Likely Case

Service interruption of Vnet/IP communications causing temporary loss of monitoring/control capabilities until process restart.

🟢

If Mitigated

Isolated network segment prevents exploitation; redundant systems maintain operations while affected component recovers.

🌐 Internet-Facing: LOW (Industrial control systems should never be directly internet-facing)
🏢 Internal Only: HIGH (Attackers on internal networks or compromised engineering workstations could exploit this to disrupt operations)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted packets to the Vnet/IP interface; no authentication needed. Attack complexity is low once network access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R1.08.00 or later

Vendor Advisory: https://web-material3.yokogawa.com/1/39281/files/YSAR-26-0002-E.pdf

Restart Required: Yes

Instructions:

1. Download updated Vnet/IP Interface Package from Yokogawa support portal. 2. Follow Yokogawa's installation guide for CENTUM VP systems. 3. Apply update to all affected systems. 4. Restart Vnet/IP services or reboot system as required.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Vnet/IP interfaces from untrusted networks using firewalls or network segmentation

Access Control Lists

all

Implement strict network ACLs to limit which systems can communicate with Vnet/IP interfaces

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Vnet/IP interfaces from all non-essential systems
  • Deploy intrusion detection/prevention systems to monitor for malicious packet patterns targeting Vnet/IP

🔍 How to Verify

Check if Vulnerable:

Check Vnet/IP Interface Package version in CENTUM VP system configuration or via Yokogawa system management tools

Check Version:

Check via CENTUM VP Engineering Station or System View software (vendor-specific tools)

Verify Fix Applied:

Verify Vnet/IP Interface Package version is R1.08.00 or later in system configuration

📡 Detection & Monitoring

Log Indicators:

  • Vnet/IP process termination events
  • Unexpected service restarts in system logs
  • Network connection attempts to Vnet/IP ports followed by service disruption

Network Indicators:

  • Unusual packet patterns to Vnet/IP ports (typically UDP/TCP ports used by Vnet/IP)
  • Traffic from unauthorized sources to industrial control network segments

SIEM Query:

source="industrial_control_logs" AND (event_type="process_termination" AND process_name="Vnet/IP") OR (network_alert="malformed_packet" AND dest_port IN (vnet_ip_ports))

🔗 References

📤 Share & Export