Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36981: CWE-125: Out-of-bounds Read in OpenPLC OpenPLC_v3

0
High
VulnerabilityCVE-2024-36981cvecve-2024-36981cwe-125
Published: Wed Sep 18 2024 (09/18/2024, 14:35:55 UTC)
Source: CVE Database V5
Vendor/Project: OpenPLC
Product: OpenPLC_v3

Description

An out-of-bounds read vulnerability exists in the OpenPLC Runtime EtherNet/IP PCCC parser functionality of OpenPLC_v3 b4702061dc14d1024856f71b4543298d77007b88. A specially crafted network request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger this vulnerability.This is the final instance of the incorrect comparison.

AI-Powered Analysis

AILast updated: 11/04/2025, 17:13:11 UTC

Technical Analysis

CVE-2024-36981 identifies an out-of-bounds read vulnerability (CWE-125) in the OpenPLC_v3 Runtime, specifically within the EtherNet/IP PCCC parser functionality. OpenPLC is an open-source industrial control system platform used for programmable logic controller (PLC) applications. The vulnerability exists in version b4702061dc14d1024856f71b4543298d77007b88 of OpenPLC_v3, where the parser incorrectly compares data lengths or indices, allowing an attacker to read memory outside the intended buffer boundaries. This memory access flaw can be triggered remotely by sending a series of specially crafted EtherNet/IP network requests to the OpenPLC device. Exploitation does not require any authentication or user interaction, making it accessible to unauthenticated remote attackers on the network. The primary impact is a denial of service (DoS), as the out-of-bounds read can cause the OpenPLC runtime to crash or become unstable, disrupting industrial processes controlled by the system. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impact limited to availability (A:H) without affecting confidentiality or integrity. No public exploits are currently known, and no patches have been linked yet, indicating the need for vigilance and proactive mitigation. The flaw is the final instance of an incorrect comparison in the parser code, suggesting prior related issues may have been addressed. Given OpenPLC's role in industrial automation, this vulnerability could have serious operational consequences if exploited.

Potential Impact

For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that utilize OpenPLC for industrial automation, this vulnerability presents a significant risk. A successful attack could cause denial of service conditions, leading to downtime of industrial processes, production halts, safety system failures, or loss of control over critical machinery. Such disruptions can have cascading effects on supply chains, operational efficiency, and safety compliance. Since the vulnerability can be exploited remotely without authentication, attackers with network access—potentially including insider threats or lateral movement from compromised systems—could trigger outages. The lack of impact on confidentiality or integrity reduces risks of data theft or manipulation but does not diminish the operational threat. Given the increasing digitalization and network connectivity of industrial control systems in Europe, the vulnerability could be leveraged in targeted attacks or ransomware campaigns aiming to disrupt industrial operations. The absence of known exploits currently provides a window for mitigation, but the high severity score underscores the urgency for affected organizations to act.

Mitigation Recommendations

1. Monitor OpenPLC vendor channels and security advisories closely for official patches or updates addressing CVE-2024-36981 and apply them promptly once available. 2. Implement network segmentation to isolate OpenPLC devices from general IT networks and restrict access to EtherNet/IP services only to trusted management systems. 3. Deploy firewall rules and intrusion detection/prevention systems (IDS/IPS) to detect and block malformed or suspicious EtherNet/IP PCCC requests that could exploit the vulnerability. 4. Conduct regular network traffic analysis to identify anomalous patterns indicative of exploitation attempts targeting the OpenPLC runtime. 5. Limit exposure by disabling unused network services and protocols on OpenPLC devices to reduce the attack surface. 6. Employ strict access controls and monitoring on networks hosting industrial control systems to prevent unauthorized lateral movement. 7. Prepare incident response plans specific to industrial control system outages to minimize downtime and ensure rapid recovery. 8. Consider deploying virtual patching or application-layer gateways that can filter malicious EtherNet/IP traffic until official patches are applied. These measures go beyond generic advice by focusing on network-level controls and operational preparedness tailored to the industrial environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-05-30T16:01:30.401Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2decf0ba78a05053719d

Added to database: 11/4/2025, 4:46:36 PM

Last enriched: 11/4/2025, 5:13:11 PM

Last updated: 11/5/2025, 1:49:20 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats