Out-of-bounds Read vulnerability in unpack_response (conn.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network.
Fixes

Solution

To fix this issue, it's suggested to update libplctag to v2.6.4


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00032}

epss

{'score': 0.00037}


Wed, 07 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 May 2025 07:15:00 +0000

Type Values Removed Values Added
Description Out-of-bounds Read vulnerability in unpack_response (conn.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network.
Title Out-of-bounds Read in libplctag library
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2025-05-07T14:02:31.645Z

Reserved: 2025-02-17T16:14:04.871Z

Link: CVE-2025-1400

cve-icon Vulnrichment

Updated: 2025-05-07T13:45:42.950Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-07T07:15:50.263

Modified: 2025-05-07T14:13:20.483

Link: CVE-2025-1400

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.