Lucene search

K
vulnrichmentTalosVULNRICHMENT:CVE-2024-39589
HistorySep 18, 2024 - 2:35 p.m.

CVE-2024-39589

2024-09-1814:35:54
CWE-704
talos
github.com
openplc
ethernet/ip
vulnerability
denial of service
pointer dereference

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

17.8%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Multiple invalid pointer dereference vulnerabilities exist in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC_v3 16bf8bac1a36d95b73e7b8722d0edb8b9c5bb56a. A specially crafted EtherNet/IP request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger these vulnerabilities.This instance of the vulnerability occurs within the Protected_Logical_Read_Reply function

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:h:openplcproject:openplc_v3:-:*:*:*:*:*:*:*"
    ],
    "vendor": "openplcproject",
    "product": "openplc_v3",
    "versions": [
      {
        "status": "affected",
        "version": "16bf8bac1a36d95b73e7b8722d0edb8b9c5bb56a"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

6.9

Confidence

High

EPSS

0.001

Percentile

17.8%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-39589