Description

A stack-based buffer overflow vulnerability exists in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC _v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted EtherNet/IP request can lead to remote code execution. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.

INFO

Published Date :

2024-09-18T14:35:55.073Z

Last Modified :

2024-09-18T18:23:23.132Z

Source :

talos
AFFECTED PRODUCTS

The following products are affected by CVE-2024-34026 vulnerability.

Vendors Products
Openplcproject
  • Openplc V3
  • Openplc V3 Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-34026.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact