Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39589: CWE-704: Incorrect Type Conversion or Cast in OpenPLC OpenPLC_v3

0
High
VulnerabilityCVE-2024-39589cvecve-2024-39589cwe-704
Published: Wed Sep 18 2024 (09/18/2024, 14:35:54 UTC)
Source: CVE Database V5
Vendor/Project: OpenPLC
Product: OpenPLC_v3

Description

Multiple invalid pointer dereference vulnerabilities exist in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC_v3 16bf8bac1a36d95b73e7b8722d0edb8b9c5bb56a. A specially crafted EtherNet/IP request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger these vulnerabilities.This instance of the vulnerability occurs within the `Protected_Logical_Read_Reply` function

AI-Powered Analysis

AILast updated: 11/04/2025, 17:14:22 UTC

Technical Analysis

CVE-2024-39589 is a vulnerability identified in OpenPLC_v3, an open-source industrial control system platform widely used for programmable logic controller (PLC) applications. The flaw resides in the EtherNet/IP protocol parser, specifically in the Protected_Logical_Read_Reply function, where multiple invalid pointer dereferences occur due to incorrect type conversion or casting (classified under CWE-704). This improper handling of input data allows an attacker to craft malicious EtherNet/IP requests that cause the OpenPLC runtime to dereference invalid pointers, leading to a denial of service (DoS) condition by crashing or destabilizing the application. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity loss. Although no exploits are currently known in the wild, the nature of the vulnerability makes it a significant risk for industrial environments where OpenPLC is deployed. The vulnerability underscores the importance of robust input validation in protocol parsers within ICS software. Since OpenPLC is often integrated into critical infrastructure systems, exploitation could disrupt industrial processes, causing operational downtime and potential safety hazards.

Potential Impact

For European organizations, the primary impact of CVE-2024-39589 is the potential denial of service of industrial control systems running OpenPLC_v3. This can lead to operational disruptions in manufacturing, energy production, water treatment, and other critical infrastructure sectors. The loss of availability in these systems can cause production halts, safety system failures, and financial losses. Given the increasing digitization and network connectivity of industrial environments in Europe, the attack surface is expanding, making such vulnerabilities more consequential. Additionally, disruption in critical infrastructure can have cascading effects on supply chains and public services. Since the vulnerability does not affect confidentiality or integrity, data theft or manipulation is not a direct concern; however, the operational impact alone is significant. The lack of required authentication and user interaction means attackers can exploit this remotely over the network, increasing the risk. European organizations with limited network segmentation or insufficient monitoring of EtherNet/IP traffic are particularly vulnerable.

Mitigation Recommendations

To mitigate CVE-2024-39589, organizations should implement the following specific measures: 1) Monitor and restrict EtherNet/IP traffic to only trusted devices and networks using industrial firewalls and network segmentation to limit exposure. 2) Employ deep packet inspection tools capable of analyzing EtherNet/IP protocol traffic to detect anomalous or malformed requests indicative of exploitation attempts. 3) Apply patches or updates from OpenPLC maintainers as soon as they become available; if no patch exists yet, consider temporary mitigations such as disabling or restricting the EtherNet/IP interface if feasible. 4) Conduct thorough input validation and fuzz testing on EtherNet/IP parser components in custom or extended OpenPLC deployments to identify and remediate similar issues proactively. 5) Implement redundancy and failover mechanisms in critical control systems to minimize operational impact from potential DoS events. 6) Train ICS security teams to recognize signs of network-based DoS attacks targeting EtherNet/IP and respond promptly. 7) Maintain an inventory of all OpenPLC instances and their versions to prioritize remediation efforts. These steps go beyond generic advice by focusing on protocol-specific controls, network-level defenses, and operational continuity planning tailored to the industrial environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-06-26T08:54:03.200Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2decf0ba78a0505371b8

Added to database: 11/4/2025, 4:46:36 PM

Last enriched: 11/4/2025, 5:14:22 PM

Last updated: 11/5/2025, 1:28:17 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats