An unauthenticated remote attacker may exhaust all available TCP connections in the CODESYS Modbus TCP Server stack if a race condition in connection handling is successfully exploited, preventing legitimate clients from establishing new connections.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2026-042 |
|
History
Tue, 12 May 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Codesys codesys
|
|
| Vendors & Products |
Codesys codesys
|
Tue, 12 May 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker may exhaust all available TCP connections in the CODESYS Modbus TCP Server stack if a race condition in connection handling is successfully exploited, preventing legitimate clients from establishing new connections. | |
| Title | Improper resource management in CODESYS Modbus TCP Server | |
| First Time appeared |
Codesys
Codesys codesys Modbus |
|
| Weaknesses | CWE-772 | |
| CPEs | cpe:2.3:a:codesys:codesys_modbus:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Codesys
Codesys codesys Modbus |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-05-12T07:14:41.517Z
Reserved: 2026-04-01T19:54:21.499Z
Link: CVE-2026-35227
No data.
Status : Received
Published: 2026-05-12T08:16:08.193
Modified: 2026-05-12T08:16:08.193
Link: CVE-2026-35227
No data.
OpenCVE Enrichment
Updated: 2026-05-12T08:45:11Z
Weaknesses