Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53476: CWE-775: Missing Release of File Descriptor or Handle after Effective Lifetime in OpenPLC OpenPLC_v3

0
Medium
VulnerabilityCVE-2025-53476cvecve-2025-53476cwe-775
Published: Tue Oct 07 2025 (10/07/2025, 13:49:56 UTC)
Source: CVE Database V5
Vendor/Project: OpenPLC
Product: OpenPLC_v3

Description

A denial of service vulnerability exists in the ModbusTCP server functionality of OpenPLC _v3 a931181e8b81e36fadf7b74d5cba99b73c3f6d58. A specially crafted series of network connections can lead to the server not processing subsequent Modbus requests. An attacker can open a series of TCP connections to trigger this vulnerability.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:12:22 UTC

Technical Analysis

CVE-2025-53476 is a denial of service vulnerability identified in the ModbusTCP server functionality of OpenPLC version v3 (commit a931181e8b81e36fadf7b74d5cba99b73c3f6d58). The root cause is a missing release of file descriptors or handles after their effective lifetime, classified under CWE-775. An attacker can exploit this by initiating a specially crafted sequence of TCP connections to the ModbusTCP server, causing it to exhaust available file descriptors or handles. As a result, the server becomes unable to process subsequent Modbus requests, effectively causing a denial of service. The vulnerability requires no privileges or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the impact on availability only, with no confidentiality or integrity impact. No known exploits are currently reported in the wild. The vulnerability affects a specific commit of OpenPLC_v3, an open-source industrial control platform used for programmable logic controller (PLC) applications, particularly in industrial automation and critical infrastructure. The flaw could disrupt industrial processes relying on ModbusTCP communications, leading to operational downtime or safety risks if control commands are delayed or blocked.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a risk of operational disruption. OpenPLC is used in programmable logic controllers that manage industrial processes; a denial of service in the ModbusTCP server can halt command processing, potentially causing production downtime, safety incidents, or cascading failures in automated systems. The impact is primarily on availability, which can translate into financial losses, regulatory non-compliance, and reputational damage. Given the reliance on industrial control systems in Europe’s manufacturing hubs (e.g., Germany, France, Italy) and energy sectors, the vulnerability could affect essential services and supply chains. Although no known exploits exist yet, the ease of exploitation (no authentication or user interaction required) means attackers could weaponize this vulnerability if they gain network access. Organizations with exposed or poorly segmented industrial networks are at higher risk.

Mitigation Recommendations

1. Network Segmentation: Isolate industrial control networks running OpenPLC from general IT networks and the internet to reduce exposure. 2. Connection Limits: Implement firewall or network device rules to limit the number of concurrent TCP connections to the ModbusTCP server, preventing resource exhaustion. 3. Monitoring and Alerting: Deploy network monitoring to detect unusual spikes in TCP connection attempts targeting ModbusTCP ports, enabling early detection of exploitation attempts. 4. Resource Hardening: Configure operating system limits on file descriptors and handles to prevent exhaustion and enable graceful degradation. 5. Vendor Patching: Monitor OpenPLC project updates and apply patches or updated versions addressing this vulnerability as soon as they become available. 6. Access Controls: Restrict access to ModbusTCP services to trusted hosts and networks only, using VPNs or secure tunnels where possible. 7. Incident Response Preparation: Develop and test response plans for industrial control system denial of service scenarios to minimize downtime impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-07-11T21:16:14.229Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e51d0ca677756fc9911217

Added to database: 10/7/2025, 2:00:44 PM

Last enriched: 11/3/2025, 6:12:22 PM

Last updated: 11/23/2025, 3:47:33 PM

Views: 165

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats