A stack-based buffer overflow vulnerability exists in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC _v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted EtherNet/IP request can lead to remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 26 Sep 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openplcproject openplc V3 Firmware
|
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:o:openplcproject:openplc_v3_firmware:2024-04-04:*:*:*:*:*:*:* | |
Vendors & Products |
Openplcproject openplc V3 Firmware
|
Wed, 18 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Openplcproject
Openplcproject openplc V3 |
|
CPEs | cpe:2.3:h:openplcproject:openplc_v3:-:*:*:*:*:*:*:* | |
Vendors & Products |
Openplcproject
Openplcproject openplc V3 |
|
Metrics |
ssvc
|
Wed, 18 Sep 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A stack-based buffer overflow vulnerability exists in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC _v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted EtherNet/IP request can lead to remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability. | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: talos
Published: 2024-09-18T14:35:55.073Z
Updated: 2024-09-18T18:23:23.132Z
Reserved: 2024-05-30T16:04:38.960Z
Link: CVE-2024-34026
Vulnrichment
Updated: 2024-09-18T16:03:10.440Z
NVD
Status : Modified
Published: 2024-09-18T15:15:14.623
Modified: 2024-11-21T09:17:56.413
Link: CVE-2024-34026
Redhat
No data.