Description

OpenPLC_V3 has a vulnerability in the enipThread function that occurs due to the lack of a return value. This leads to a crash when the server loop ends and execution hits an illegal ud2 instruction. This issue can be triggered remotely without authentication by starting the same server multiple times or if the server exits unexpectedly. The vulnerability allows an attacker to cause a Denial of Service (DoS) against the PLC runtime, stopping any PC started remotely without authentication. This results in the PLC process crashing and halting all automation or control logic managed by OpenPLC.

INFO

Published Date :

2025-10-01T21:22:31.015Z

Last Modified :

2025-10-02T15:53:32.988Z

Source :

icscert
AFFECTED PRODUCTS

The following products are affected by CVE-2025-54811 vulnerability.

Vendors Products
Openplcproject
  • Openplc V3
  • Openplc V3 Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-54811.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact