Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2026-042 |
|
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codesys codesys
|
|
| Vendors & Products |
Codesys codesys
|
Tue, 12 May 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker may exhaust all available TCP connections in the CODESYS Modbus TCP Server stack if a race condition in connection handling is successfully exploited, preventing legitimate clients from establishing new connections. | |
| Title | Improper resource management in CODESYS Modbus TCP Server | |
| First Time appeared |
Codesys
Codesys codesys Modbus |
|
| Weaknesses | CWE-772 | |
| CPEs | cpe:2.3:a:codesys:codesys_modbus:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Codesys
Codesys codesys Modbus |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-05-13T14:38:41.132Z
Reserved: 2026-04-01T19:54:21.499Z
Link: CVE-2026-35227
Updated: 2026-05-13T14:29:16.341Z
Status : Awaiting Analysis
Published: 2026-05-12T08:16:08.193
Modified: 2026-05-12T14:15:46.747
Link: CVE-2026-35227
No data.
OpenCVE Enrichment
Updated: 2026-05-12T08:45:11Z