OpENer v2.3-558-g1e99582 contains an out-of-bounds read vulnerability in the Common Packet Format (CPF) parser, specifically in CreateCommonPacketFormatStructure() in source/src/enet_encap/cpf.c. A crafted ENIP/CPF message can supply an attacker-controlled item_count value that is not consistently validated against the remaining data_length of the CPF slice
Metrics
Affected Vendors & Products
References
History
Tue, 19 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eipstackgroup
Eipstackgroup opener |
|
| Vendors & Products |
Eipstackgroup
Eipstackgroup opener |
Mon, 18 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out-of-Bounds Read in OpENer Common Packet Format Parser |
Mon, 18 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out-of-bounds read in OpENer CPF parser | |
| Weaknesses | CWE-20 |
Mon, 18 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 18 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out-of-bounds read in OpENer CPF parser | |
| Weaknesses | CWE-125 CWE-20 |
Mon, 18 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpENer v2.3-558-g1e99582 contains an out-of-bounds read vulnerability in the Common Packet Format (CPF) parser, specifically in CreateCommonPacketFormatStructure() in source/src/enet_encap/cpf.c. A crafted ENIP/CPF message can supply an attacker-controlled item_count value that is not consistently validated against the remaining data_length of the CPF slice | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-05-18T00:00:00.000Z
Updated: 2026-05-18T17:18:48.846Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38719
Updated: 2026-05-18T17:18:40.788Z
Status : Deferred
Published: 2026-05-18T17:16:32.127
Modified: 2026-05-18T20:27:23.023
Link: CVE-2026-38719
No data.