Home

Description

OpenPLC_V3 has a vulnerability in the enipThread function that occurs due to the lack of a return value. This leads to a crash when the server loop ends and execution hits an illegal ud2 instruction. This issue can be triggered remotely without authentication by starting the same server multiple times or if the server exits unexpectedly. The vulnerability allows an attacker to cause a Denial of Service (DoS) against the PLC runtime, stopping any PC started remotely without authentication. This results in the PLC process crashing and halting all automation or control logic managed by OpenPLC.

PUBLISHED Reserved 2025-09-23 | Published 2025-10-01 | Updated 2025-10-01 | Assigner icscert




HIGH: 7.1CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

MEDIUM: 6.1CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H

Problem types

CWE-758

Product status

Default status
unaffected

Any version before pull request #292
affected

Credits

Renato Garreton of TryHackMe reported this vulnerability to CISA. finder

References

www.cisa.gov/news-events/ics-advisories/icsa-25-273-05

github.com/thiagoralves/OpenPLC_v3

cve.org (CVE-2025-54811)

nvd.nist.gov (CVE-2025-54811)

Download JSON