Impact
OpenPLC_V3 contains an Initialization of a Resource with an Insecure Default flaw that can allow an attacker to bypass API authentication and gain unauthorized access to the system. This vulnerability poses a high confidentiality risk, enabling potential control over PLC functions and data.
Affected Systems
The affected vendor is OpenPLC_V3 with the product OpenPLC_V3. No specific version information is listed, so all current releases of OpenPLC_V3 may be susceptible.
Risk and Exploitability
With a CVSS score of 9.2 the vulnerability is considered critical. EPSS data is not available and the flaw is not tracked in the CISA KEV catalog. The likely attack vector is remote access to the exposed API, as inferred from the description of authentication bypass. Exploitation would require an attacker to interact with the vulnerable API endpoint, making the flaw highly actionable in networked environments.
OpenCVE Enrichment