Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out-of-Bounds Read in OpENer Common Packet Format Parser |
Mon, 18 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out-of-bounds read in OpENer CPF parser | |
| Weaknesses | CWE-20 |
Mon, 18 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 18 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out-of-bounds read in OpENer CPF parser | |
| Weaknesses | CWE-125 CWE-20 |
Mon, 18 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpENer v2.3-558-g1e99582 contains an out-of-bounds read vulnerability in the Common Packet Format (CPF) parser, specifically in CreateCommonPacketFormatStructure() in source/src/enet_encap/cpf.c. A crafted ENIP/CPF message can supply an attacker-controlled item_count value that is not consistently validated against the remaining data_length of the CPF slice | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-18T17:18:48.846Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38719
Updated: 2026-05-18T17:18:40.788Z
Status : Deferred
Published: 2026-05-18T17:16:32.127
Modified: 2026-05-18T20:27:23.023
Link: CVE-2026-38719
No data.
OpenCVE Enrichment
Updated: 2026-05-18T21:00:14Z