Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39590: CWE-704: Incorrect Type Conversion or Cast in OpenPLC OpenPLC_v3

0
High
VulnerabilityCVE-2024-39590cvecve-2024-39590cwe-704
Published: Wed Sep 18 2024 (09/18/2024, 14:35:54 UTC)
Source: CVE Database V5
Vendor/Project: OpenPLC
Product: OpenPLC_v3

Description

Multiple invalid pointer dereference vulnerabilities exist in the OpenPLC Runtime EtherNet/IP parser functionality of OpenPLC_v3 16bf8bac1a36d95b73e7b8722d0edb8b9c5bb56a. A specially crafted EtherNet/IP request can lead to denial of service. An attacker can send a series of EtherNet/IP requests to trigger these vulnerabilities.This instance of the vulnerability occurs within the `Protected_Logical_Write_Reply` function

AI-Powered Analysis

AILast updated: 11/04/2025, 17:14:50 UTC

Technical Analysis

CVE-2024-39590 is a vulnerability identified in OpenPLC_v3, an open-source industrial control system platform. The flaw resides in the EtherNet/IP protocol parser, specifically in the Protected_Logical_Write_Reply function, where multiple invalid pointer dereferences occur due to incorrect type conversion or casting (CWE-704). This vulnerability allows an unauthenticated remote attacker to send a series of specially crafted EtherNet/IP requests that trigger these invalid pointer dereferences, causing the OpenPLC runtime to crash or become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is exploitable over the network without requiring any privileges or user interaction, making it relatively easy to exploit in environments where OpenPLC is exposed. The CVSS v3.1 score of 7.5 reflects the high impact on availability with no impact on confidentiality or integrity. The vulnerability affects a specific commit/version of OpenPLC_v3 (16bf8bac1a36d95b73e7b8722d0edb8b9c5bb56a). Although no public exploits are known at this time, the nature of the flaw and the critical role of OpenPLC in industrial automation systems make this a significant threat. The root cause is improper handling of data types during the parsing of EtherNet/IP protocol messages, leading to unsafe memory operations and crashes. This vulnerability highlights the importance of robust input validation and type safety in industrial protocol implementations.

Potential Impact

The primary impact of CVE-2024-39590 is denial of service, which can disrupt industrial control processes managed by OpenPLC. For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that rely on OpenPLC for automation, this can lead to operational downtime, safety risks, and financial losses. The vulnerability does not compromise data confidentiality or integrity but affects system availability, which is critical in industrial environments. Disruption of control systems can halt production lines or cause unsafe conditions if safety interlocks or monitoring systems fail. Given the network-exploitable nature without authentication, attackers could target exposed OpenPLC instances remotely, increasing the risk of widespread disruption. The lack of known exploits currently limits immediate risk, but the potential for future exploitation remains. Organizations with insufficient network segmentation or exposure of EtherNet/IP services to untrusted networks are at higher risk. The impact is amplified in sectors with stringent uptime requirements and regulatory compliance obligations, such as energy grids and manufacturing plants.

Mitigation Recommendations

1. Apply patches or updates from the OpenPLC project as soon as they become available to address the pointer dereference issues. 2. Until patches are released, implement strict network segmentation to isolate OpenPLC systems from untrusted networks, limiting access to EtherNet/IP ports only to trusted devices. 3. Deploy network-level filtering and intrusion detection systems to monitor and block malformed or suspicious EtherNet/IP traffic targeting OpenPLC devices. 4. Conduct regular security assessments and penetration tests focusing on industrial protocol implementations to identify similar vulnerabilities. 5. Enforce strict access controls and minimize exposure of OpenPLC runtime services to the internet or large internal networks. 6. Maintain up-to-date inventories of OpenPLC deployments and versions to prioritize remediation efforts. 7. Educate operational technology (OT) staff on the risks of malformed protocol messages and encourage monitoring for unusual system crashes or network traffic patterns. 8. Consider implementing application-layer firewalls or protocol-aware gateways that can validate EtherNet/IP message integrity before forwarding to OpenPLC devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2024-06-26T08:54:03.201Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a2deef0ba78a0505371f6

Added to database: 11/4/2025, 4:46:38 PM

Last enriched: 11/4/2025, 5:14:50 PM

Last updated: 12/17/2025, 6:23:40 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats