PatchSiren cyber security CVE debrief
CVE-2025-48023 Yokogawa Electric Corporation CVE debrief
CVE-2025-48023 is a medium-severity availability issue in Yokogawa CENTUM VP Vnet/IP interface packages. The CISA CSAF advisory republished on 2026-02-26 says maliciously crafted packets can terminate the Vnet/IP software stack process, which can disrupt affected OT communications. Yokogawa recommends upgrading to R1.08.00.
- Vendor
- Yokogawa Electric Corporation
- Product
- Yokogawa Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300) <=R1.07.00 Vnet/IP Interface Package for CENTUM VP R7 (VP7C3300)
- CVSS
- MEDIUM 5.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-02-26
- Original CVE updated
- 2026-02-26
- Advisory published
- 2026-02-26
- Advisory updated
- 2026-02-26
Who should care
OT and ICS defenders running Yokogawa CENTUM VP R6/R7 environments, especially teams responsible for Vnet/IP connectivity, patching, and network segmentation.
Technical summary
The advisory covers Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300) up to R1.07.00 and Vnet/IP Interface Package for CENTUM VP R7 (VP7C3300). The reported condition is process termination in the Vnet/IP software stack when the product receives maliciously crafted packets. The supplied CVSS v3.1 vector (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) indicates adjacent-network attack conditions, high attack complexity, no privileges required, no user interaction, and an availability-only impact.
Defensive priority
High for affected OT environments because the flaw can terminate a core Vnet/IP process and interrupt industrial communications, even though the base CVSS score is 5.3.
Recommended defensive actions
- Apply Yokogawa patch software R1.08.00 for the affected product lines.
- Review the Yokogawa advisory YSAR-26-0002 for deployment guidance and support contacts.
- Limit and segment access to the affected Vnet/IP interfaces, following ICS network defense best practices.
- Validate recovery procedures, monitoring, and change control before and after patching in production OT environments.
Evidence notes
All facts in this debrief come from the supplied CISA CSAF advisory material republished as ICSA-26-057-09 on 2026-02-26 and its listed remediation guidance. The corpus states that maliciously crafted packets may terminate the Vnet/IP software stack process and that patch software R1.08.00 is the recommended mitigation. The supplied enrichment also indicates no KEV entry and no known ransomware campaign use.
Official resources
-
CVE-2025-48023 CVE record
CVE.org
-
CVE-2025-48023 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Public advisory information was published by CISA on 2026-02-26 as ICSA-26-057-09, republishing Yokogawa advisory YSAR-26-0002. The issue description centers on a Vnet/IP software stack process termination condition triggered by maliciously