CVE-2024-36845: n/a
An invalid pointer in the modbus_receive() function of libmodbus v3.1.6 allows attackers to cause a Denial of Service (DoS) via a crafted message sent to the unit-test-server.
AI Analysis
Technical Summary
CVE-2024-36845 identifies a vulnerability in libmodbus version 3.1.6, specifically within the modbus_receive() function. The issue arises from an invalid pointer dereference triggered by processing a specially crafted Modbus message sent to the unit-test-server component. This leads to a Denial of Service (DoS) condition, causing the affected application or device to crash or become unresponsive. The vulnerability is classified under CWE-400, indicating a resource exhaustion or DoS weakness. Exploitation requires network access to the modbus service and low privileges (PR:L), but no user interaction is necessary. The CVSS v3.1 score is 4.3 (medium), reflecting a network attack vector with low complexity and no impact on confidentiality or integrity, only availability. No patches or known exploits are currently available, suggesting the vulnerability is newly disclosed. Libmodbus is widely used in industrial control systems (ICS), SCADA environments, and IoT devices for communication with Modbus protocol-enabled equipment. The unit-test-server is likely a testing or diagnostic component that may be exposed in some deployments, increasing the attack surface. Attackers could leverage this flaw to disrupt industrial processes or critical infrastructure by causing service interruptions.
Potential Impact
For European organizations, especially those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a risk of service disruption. A successful DoS attack could halt communication between control systems and field devices, potentially leading to operational downtime, safety hazards, and financial losses. While the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect production lines, utilities, and transportation systems relying on Modbus communications. The medium severity and lack of known exploits reduce immediate risk, but the widespread use of libmodbus in Europe’s industrial base means that unpatched systems could be targeted in the future. Disruptions in critical sectors could have cascading effects on supply chains and public services. Organizations with exposed or poorly segmented modbus services are at higher risk.
Mitigation Recommendations
1. Immediately audit network exposure of libmodbus services, especially the unit-test-server component, and restrict access to trusted hosts only via network segmentation and firewall rules. 2. Implement strict network-level controls such as VPNs or dedicated industrial networks to isolate modbus traffic from general IT networks. 3. Monitor network traffic for anomalous or malformed Modbus messages that could indicate exploitation attempts. 4. Engage with libmodbus maintainers or vendors for updates and patches; apply them promptly once available. 5. Conduct thorough testing of industrial control systems to identify any exposed unit-test-server interfaces and disable or restrict them if not required. 6. Incorporate this vulnerability into incident response plans, ensuring readiness to respond to DoS events affecting modbus communications. 7. Educate operational technology (OT) teams about this vulnerability and best practices for securing modbus implementations. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for malformed modbus packets targeting this vulnerability.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Sweden
CVE-2024-36845: n/a
Description
An invalid pointer in the modbus_receive() function of libmodbus v3.1.6 allows attackers to cause a Denial of Service (DoS) via a crafted message sent to the unit-test-server.
AI-Powered Analysis
Technical Analysis
CVE-2024-36845 identifies a vulnerability in libmodbus version 3.1.6, specifically within the modbus_receive() function. The issue arises from an invalid pointer dereference triggered by processing a specially crafted Modbus message sent to the unit-test-server component. This leads to a Denial of Service (DoS) condition, causing the affected application or device to crash or become unresponsive. The vulnerability is classified under CWE-400, indicating a resource exhaustion or DoS weakness. Exploitation requires network access to the modbus service and low privileges (PR:L), but no user interaction is necessary. The CVSS v3.1 score is 4.3 (medium), reflecting a network attack vector with low complexity and no impact on confidentiality or integrity, only availability. No patches or known exploits are currently available, suggesting the vulnerability is newly disclosed. Libmodbus is widely used in industrial control systems (ICS), SCADA environments, and IoT devices for communication with Modbus protocol-enabled equipment. The unit-test-server is likely a testing or diagnostic component that may be exposed in some deployments, increasing the attack surface. Attackers could leverage this flaw to disrupt industrial processes or critical infrastructure by causing service interruptions.
Potential Impact
For European organizations, especially those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a risk of service disruption. A successful DoS attack could halt communication between control systems and field devices, potentially leading to operational downtime, safety hazards, and financial losses. While the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect production lines, utilities, and transportation systems relying on Modbus communications. The medium severity and lack of known exploits reduce immediate risk, but the widespread use of libmodbus in Europe’s industrial base means that unpatched systems could be targeted in the future. Disruptions in critical sectors could have cascading effects on supply chains and public services. Organizations with exposed or poorly segmented modbus services are at higher risk.
Mitigation Recommendations
1. Immediately audit network exposure of libmodbus services, especially the unit-test-server component, and restrict access to trusted hosts only via network segmentation and firewall rules. 2. Implement strict network-level controls such as VPNs or dedicated industrial networks to isolate modbus traffic from general IT networks. 3. Monitor network traffic for anomalous or malformed Modbus messages that could indicate exploitation attempts. 4. Engage with libmodbus maintainers or vendors for updates and patches; apply them promptly once available. 5. Conduct thorough testing of industrial control systems to identify any exposed unit-test-server interfaces and disable or restrict them if not required. 6. Incorporate this vulnerability into incident response plans, ensuring readiness to respond to DoS events affecting modbus communications. 7. Educate operational technology (OT) teams about this vulnerability and best practices for securing modbus implementations. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for malformed modbus packets targeting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-30T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6909214cfe7723195e054536
Added to database: 11/3/2025, 9:40:28 PM
Last enriched: 11/3/2025, 10:17:38 PM
Last updated: 12/19/2025, 4:45:19 PM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66580: CWE-94: Improper Control of Generation of Code ('Code Injection') in OpenAgentPlatform Dive
CriticalCVE-2025-65035: CWE-502: Deserialization of Untrusted Data in pluginsGLPI databaseinventory
MediumCVE-2025-14956: Heap-based Buffer Overflow in WebAssembly Binaryen
MediumCVE-2025-14955: Improper Initialization in Open5GS
MediumCVE-2025-14812: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in The Browser Company of New York ArcSearch
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.