Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36845: n/a

0
Medium
VulnerabilityCVE-2024-36845cvecve-2024-36845
Published: Fri May 31 2024 (05/31/2024, 19:16:27 UTC)
Source: CVE Database V5

Description

An invalid pointer in the modbus_receive() function of libmodbus v3.1.6 allows attackers to cause a Denial of Service (DoS) via a crafted message sent to the unit-test-server.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:17:38 UTC

Technical Analysis

CVE-2024-36845 identifies a vulnerability in libmodbus version 3.1.6, specifically within the modbus_receive() function. The issue arises from an invalid pointer dereference triggered by processing a specially crafted Modbus message sent to the unit-test-server component. This leads to a Denial of Service (DoS) condition, causing the affected application or device to crash or become unresponsive. The vulnerability is classified under CWE-400, indicating a resource exhaustion or DoS weakness. Exploitation requires network access to the modbus service and low privileges (PR:L), but no user interaction is necessary. The CVSS v3.1 score is 4.3 (medium), reflecting a network attack vector with low complexity and no impact on confidentiality or integrity, only availability. No patches or known exploits are currently available, suggesting the vulnerability is newly disclosed. Libmodbus is widely used in industrial control systems (ICS), SCADA environments, and IoT devices for communication with Modbus protocol-enabled equipment. The unit-test-server is likely a testing or diagnostic component that may be exposed in some deployments, increasing the attack surface. Attackers could leverage this flaw to disrupt industrial processes or critical infrastructure by causing service interruptions.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a risk of service disruption. A successful DoS attack could halt communication between control systems and field devices, potentially leading to operational downtime, safety hazards, and financial losses. While the vulnerability does not compromise data confidentiality or integrity, the availability impact can affect production lines, utilities, and transportation systems relying on Modbus communications. The medium severity and lack of known exploits reduce immediate risk, but the widespread use of libmodbus in Europe’s industrial base means that unpatched systems could be targeted in the future. Disruptions in critical sectors could have cascading effects on supply chains and public services. Organizations with exposed or poorly segmented modbus services are at higher risk.

Mitigation Recommendations

1. Immediately audit network exposure of libmodbus services, especially the unit-test-server component, and restrict access to trusted hosts only via network segmentation and firewall rules. 2. Implement strict network-level controls such as VPNs or dedicated industrial networks to isolate modbus traffic from general IT networks. 3. Monitor network traffic for anomalous or malformed Modbus messages that could indicate exploitation attempts. 4. Engage with libmodbus maintainers or vendors for updates and patches; apply them promptly once available. 5. Conduct thorough testing of industrial control systems to identify any exposed unit-test-server interfaces and disable or restrict them if not required. 6. Incorporate this vulnerability into incident response plans, ensuring readiness to respond to DoS events affecting modbus communications. 7. Educate operational technology (OT) teams about this vulnerability and best practices for securing modbus implementations. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures for malformed modbus packets targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-05-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909214cfe7723195e054536

Added to database: 11/3/2025, 9:40:28 PM

Last enriched: 11/3/2025, 10:17:38 PM

Last updated: 12/20/2025, 5:18:38 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats