Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34226: CWE-664 Improper Control of a Resource Through Its Lifetime in Autonomy Logic OpenPLC Runtime

0
High
VulnerabilityCVE-2025-34226cvecve-2025-34226cwe-664cwe-20
Published: Fri Oct 03 2025 (10/03/2025, 15:36:03 UTC)
Source: CVE Database V5
Vendor/Project: Autonomy Logic
Product: OpenPLC Runtime

Description

OpenPLC Runtime v3 contains an input validation flaw in the /upload-program-action endpoint: the epoch_time field supplied during program uploads is not validated and can be crafted to induce corruption of the programs database. After a successful malformed upload the runtime continues to operate until a restart; on restart the runtime can fail to start because of corrupted database entries, resulting in persistent denial of service requiring complete rebase of the product to recover. This vulnerability was remediated by commit 095ee09.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:29:08 UTC

Technical Analysis

CVE-2025-34226 is a vulnerability classified under CWE-664 (Improper Control of a Resource Through Its Lifetime) and CWE-20 (Improper Input Validation) affecting Autonomy Logic's OpenPLC Runtime version 3.0. The flaw exists in the /upload-program-action endpoint, specifically in the handling of the epoch_time field during program uploads. The input is not properly validated, allowing an attacker to craft a malformed epoch_time value that corrupts the internal programs database. While the runtime continues to function normally after the malformed upload, the corruption manifests upon the next restart, causing the runtime to fail to initialize. This failure results in a persistent denial of service condition that cannot be resolved without a complete rebase of the product, which is a time-consuming and disruptive recovery process. The vulnerability can be exploited remotely over the network without requiring user interaction, but it does require low-level privileges (PR:L) on the system. The CVSS v4.0 base score is 7.1, reflecting high severity due to the impact on availability and the ease of exploitation. The vulnerability was addressed by a code commit (095ee09), though no official patch links are provided in the data. No known exploits have been reported in the wild as of the publication date (October 3, 2025). This vulnerability poses a significant risk to industrial control systems relying on OpenPLC Runtime for programmable logic controller (PLC) operations.

Potential Impact

The primary impact of CVE-2025-34226 is a persistent denial of service affecting the OpenPLC Runtime, which is critical in industrial automation and control environments. Organizations using vulnerable versions may experience operational downtime when the runtime fails to restart due to database corruption. This downtime can disrupt manufacturing processes, critical infrastructure operations, and other automated systems dependent on PLCs, potentially leading to financial losses, safety hazards, and reduced operational efficiency. Recovery requires a complete rebase of the product, which is resource-intensive and may extend outage durations. Since the vulnerability can be exploited remotely with low privileges and no user interaction, it increases the attack surface for adversaries aiming to disrupt industrial operations. Although no exploits are currently known in the wild, the high severity and ease of exploitation make it a significant risk for organizations using OpenPLC Runtime v3.0.

Mitigation Recommendations

To mitigate CVE-2025-34226, organizations should immediately upgrade OpenPLC Runtime to a version that includes the fix from commit 095ee09 or later. If an upgrade is not immediately possible, restrict network access to the /upload-program-action endpoint to trusted users and systems only, employing network segmentation and firewall rules. Implement strict access controls and monitoring for any program upload activities to detect anomalous or malformed inputs. Regularly back up the programs database to enable recovery without a full rebase in case of corruption. Employ intrusion detection systems (IDS) to monitor for suspicious requests targeting the upload endpoint. Additionally, conduct thorough input validation and sanitization on any custom integrations interacting with OpenPLC Runtime. Finally, establish incident response procedures to quickly address any denial of service events related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.574Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68dfee6e88368ae77cfd5805

Added to database: 10/3/2025, 3:40:30 PM

Last enriched: 3/24/2026, 12:29:08 AM

Last updated: 3/28/2026, 9:45:27 AM

Views: 206

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses