Impact
An unauthenticated remote attacker can exhaust all available TCP connections in the CODESYS EtherNet/IP adapter stack by repeatedly opening connections, causing legitimate clients to be unable to connect. The vulnerability arises from improper timeout handling in the adapter, a flaw classified as CWE-754, and results in a denial of service condition where new connections are blocked for the duration of the exhaustion.
Affected Systems
The affected product is CODESYS EtherNetIP from the vendor CODESYS. No specific version information is provided, so all installations of the CODESYS EtherNetIP adapter are potentially impacted.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity of this vulnerability. The EPSS score of less than 1% suggests a very low probability of exploitation at the time of analysis, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote network access, with authentication not required, and the exploit requires only the ability to open repeated TCP connections to the targeted device.
OpenCVE Enrichment