{"id":168953,"date":"2024-09-26T17:49:13","date_gmt":"2024-09-26T17:49:13","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=168953"},"modified":"2024-09-26T17:49:15","modified_gmt":"2024-09-26T17:49:15","slug":"openplc-critical-flaw","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/168953\/ics-scada\/openplc-critical-flaw.html","title":{"rendered":"Critical RCE vulnerability found in OpenPLC"},"content":{"rendered":"
<\/div>\n

Cisco\u2019s Talos reported critical and high-severity flaws in OpenPLC that could lead to DoS condition and remote code execution.<\/h2>\n\n\n\n

Cisco\u2019s Talos threat intelligence unit has disclosed details of five newly patched vulnerabilities in OpenPLC, an open-source programmable logic controller. <\/p>\n\n\n\n

These vulnerabilities can be exploited to trigger a denial-of-service (DoS) condition or execute remote code. OpenPLC is an open-source programmable logic controller (PLC) designed to offer a low-cost solution for industrial automation. It is widely used for automating machines and processes in industries like manufacturing, energy, and utilities.<\/p>\n\n\n\n

The most severe issue is a stack-based buffer overflow vulnerability, tracked as CVE-2024-34026<\/a> (CVSS score 9.0), that resides in the OpenPLC Runtime EtherNet\/IP parser functionality of OpenPLC _v3 b4702061dc14d1024856f71b4543298d77007b88.<\/p>\n\n\n\n

An attacker could trigger the vulnerability to achieve remote code execution.<\/p>\n\n\n\n

“A specially crafted EtherNet\/IP request can lead to remote code execution. An attacker can send a series of EtherNet\/IP requests to trigger this vulnerability.” reads the advisory<\/a>.<\/em><\/p>\n\n\n\n

The vulnerability was discovered by Jared Rittle of Cisco Talos that reported the issue to the maintainers of the project on June 10, 2024. The issue was addressed on September 18, 2024.<\/p>\n\n\n\n

The remaining DoS flaws discovered by Talos are tracked as CVE-2024-36980, CVE-2024-36981<\/a>,\u00a0CVE-2024-39589, and CVE-2024-39590<\/a>.\u00a0<\/p>\n\n\n\n

An attacker can exploit these high-severity vulnerabilities by sending specially crafted EtherNet\/IP requests.<\/p>\n\n\n\n

Users are recommended to update OpenPLC to the latest version that addresses the above vulnerabilities.<\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/strong><\/a><\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, RCE)<\/strong><\/p>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Cisco\u2019s Talos reported critical and high-severity flaws in OpenPLC that could lead to DoS condition and remote code execution. Cisco\u2019s Talos threat intelligence unit has disclosed details of five newly patched vulnerabilities in OpenPLC, an open-source programmable logic controller. These vulnerabilities can be exploited to trigger a denial-of-service (DoS) condition or execute remote code. OpenPLC […]<\/p>\n","protected":false},"author":1,"featured_media":168958,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,10150,55],"tags":[1725,4112,9508,9506,15398,687,4594,841,1533],"class_list":["post-168953","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-ics-scada","category-security","tag-dos","tag-hacking","tag-hacking-news","tag-information-security-news","tag-openplc","tag-pierluigi-paganini","tag-rce","tag-security-affairs","tag-security-news"],"yoast_head":"\n杭州江阴科强工业胶带有限公司