The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-48021

CVE-2025-48021: Yokogawa Vnet/IP Interface DoS Vulnerability

CVE-2025-48021 is a denial of service vulnerability in Yokogawa Vnet/IP Interface Package that allows attackers to terminate the software stack process. This post covers technical details, affected versions, and mitigation.

Published: February 20, 2026

CVE-2025-48021 Overview

A vulnerability has been discovered in the Vnet/IP Interface Package provided by Yokogawa Electric Corporation. When affected products receive maliciously crafted packets, the Vnet/IP software stack process may be terminated, resulting in a denial of service condition. This integer underflow vulnerability (CWE-191) affects industrial control systems used in critical infrastructure environments.

Critical Impact

Exploitation of this vulnerability could terminate the Vnet/IP software stack process, potentially disrupting industrial control system operations in critical infrastructure environments.

Affected Products

  • Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300) - Version R1.07.00 or earlier
  • Vnet/IP Interface Package for CENTUM VP R7 (VP7C3300) - Version R1.07.00 or earlier

Discovery Timeline

  • 2026-02-13 - CVE-2025-48021 published to NVD
  • 2026-02-13 - Last updated in NVD database

Technical Details for CVE-2025-48021

Vulnerability Analysis

This vulnerability is classified as an Integer Underflow (CWE-191), where arithmetic operations on integer values result in a value that wraps below the minimum representable value. In the context of the Vnet/IP Interface Package, this flaw exists in the network packet processing functionality. When the software stack receives specially crafted network packets, the integer underflow condition can be triggered, causing the Vnet/IP process to terminate unexpectedly.

The attack requires adjacent network access, meaning an attacker must be positioned on the same network segment as the target device. While no authentication is required to exploit this vulnerability, the attack complexity is considered high. Successful exploitation results in high availability impact as the affected service terminates, though no confidentiality or integrity impacts have been identified.

Root Cause

The root cause of this vulnerability is an integer underflow condition (CWE-191) within the Vnet/IP software stack's packet processing routines. When certain arithmetic operations are performed on packet data without proper boundary validation, the resulting value can underflow, leading to unexpected behavior that causes the process to terminate.

Attack Vector

The attack vector requires adjacent network access (not remotely exploitable over the internet). An attacker positioned on the same network segment as the vulnerable Yokogawa CENTUM VP system could send maliciously crafted network packets to the Vnet/IP interface. The crafted packets exploit the integer underflow condition in the packet processing logic, causing the Vnet/IP software stack to terminate. This denial of service could impact the availability of the distributed control system.

The attack does not require any privileges or user interaction, making it a concern for industrial environments where network segmentation may not be strictly enforced. For detailed technical information, refer to the Yokogawa Security Assessment Report.

Detection Methods for CVE-2025-48021

Indicators of Compromise

  • Unexpected termination or crashes of the Vnet/IP software stack process on CENTUM VP systems
  • Repeated service restarts on Vnet/IP Interface Package components
  • Anomalous network traffic patterns targeting Vnet/IP communication ports from adjacent network segments

Detection Strategies

  • Monitor for abnormal process terminations on CENTUM VP R6 and R7 systems running Vnet/IP Interface Package
  • Implement network intrusion detection rules to identify malformed packets targeting Vnet/IP protocol communications
  • Deploy industrial protocol-aware monitoring solutions to detect anomalous packet structures
  • Review system logs for recurring Vnet/IP service failures or automatic restart events

Monitoring Recommendations

  • Enable detailed logging on Vnet/IP Interface Package components and centralize log collection
  • Configure alerting for any unexpected Vnet/IP process terminations in the SCADA/DCS monitoring system
  • Monitor network traffic on segments containing CENTUM VP systems for unusual packet patterns
  • Implement baseline monitoring for normal Vnet/IP communication patterns to detect deviations

How to Mitigate CVE-2025-48021

Immediate Actions Required

  • Review and apply network segmentation to isolate CENTUM VP systems from untrusted network segments
  • Restrict network access to Vnet/IP interfaces to only authorized systems and personnel
  • Monitor for any available patches or firmware updates from Yokogawa Electric Corporation
  • Implement firewall rules to control traffic to and from Vnet/IP Interface Package components

Patch Information

Organizations should consult the Yokogawa Security Assessment Report for official remediation guidance and patch availability. Contact Yokogawa Electric Corporation support for specific patch information applicable to your CENTUM VP deployment.

Workarounds

  • Implement strict network segmentation to prevent unauthorized adjacent network access to CENTUM VP systems
  • Deploy industrial firewalls or access control lists to limit network access to Vnet/IP interfaces
  • Use VLANs and network access control (NAC) to restrict which devices can communicate with control system components
  • Consider implementing application-level monitoring to detect and alert on abnormal Vnet/IP behavior
bash
# Example network segmentation configuration (generic firewall concept)
# Restrict access to Vnet/IP interfaces from unauthorized segments
# Consult your specific firewall/network equipment documentation

# Allow only authorized SCADA workstations to access CENTUM VP Vnet/IP
# Deny all other adjacent network traffic to control system segments
# Implement logging for any denied connection attempts

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechYokogawa

  • SeverityMEDIUM

  • CVSS Score6.0

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-191
  • Technical References
  • Yokogawa Security Assessment Report
  • Related CVEs
  • CVE-2025-48023: Yokogawa Vnet/IP Interface DoS Vulnerability

  • CVE-2025-48022: Yokogawa Vnet/IP Interface DoS Vulnerability

  • CVE-2025-48020: Yokogawa Vnet/IP Interface DoS Vulnerability

  • CVE-2025-48019: Yokogawa Vnet/IP Interface DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English