Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46275 | An unauthenticated remote attacker can use a malicious OPC UA client to send a crafted request to affected CODESYS products which can cause a DoS due to incorrect calculation of buffer size. |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-08-01T20:55:10.389Z
Reserved: 2024-05-16T12:09:56.937Z
Link: CVE-2024-5000
Updated: 2024-08-01T20:55:10.389Z
Status : Deferred
Published: 2024-06-04T09:15:09.830
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-5000
No data.
OpenCVE Enrichment
No data.
EUVD