CVE-2024-34026

A stack-based buffer overflow vulnerability exists in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC _v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted EtherNet/IP request can lead to remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2024-2005 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:openplcproject:openplc_v3_firmware:2024-04-04:*:*:*:*:*:*:*

History

26 Sep 2024, 20:52

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2024-2005 - () https://talosintelligence.com/vulnerability_reports/TALOS-2024-2005 - Exploit, Third Party Advisory
First Time Openplcproject
Openplcproject openplc V3 Firmware
CPE cpe:2.3:o:openplcproject:openplc_v3_firmware:2024-04-04:*:*:*:*:*:*:*
CWE CWE-787
CVSS v2 : unknown
v3 : 9.0
v2 : unknown
v3 : 9.8

20 Sep 2024, 12:30

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de desbordamiento de búfer basada en pila en la funcionalidad del analizador EtherNet/IP de OpenPLC Runtime de OpenPLC _v3 b4702061dc14d1024856f71b4543298d77007b88. Una solicitud EtherNet/IP especialmente manipulada puede provocar la ejecución remota de código. Un atacante puede enviar una serie de solicitudes EtherNet/IP para activar esta vulnerabilidad.

18 Sep 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-18 15:15

Updated : 2024-09-26 20:52


NVD link : CVE-2024-34026

Mitre link : CVE-2024-34026

CVE.ORG link : CVE-2024-34026


JSON object : View

Products Affected

openplcproject

  • openplc_v3_firmware
CWE
CWE-787

Out-of-bounds Write

CWE-121

Stack-based Buffer Overflow