OpENer v2.3-558-g1e99582 contains an out-of-bounds read vulnerability in the Common Packet Format (CPF) parser, specifically in CreateCommonPacketFormatStructure() in source/src/enet_encap/cpf.c. A crafted ENIP/CPF message can supply an attacker-controlled item_count value that is not consistently validated against the remaining data_length of the CPF slice
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 18 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Out-of-bounds read in OpENer CPF parser | |
| Weaknesses | CWE-125 CWE-20 |
Mon, 18 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpENer v2.3-558-g1e99582 contains an out-of-bounds read vulnerability in the Common Packet Format (CPF) parser, specifically in CreateCommonPacketFormatStructure() in source/src/enet_encap/cpf.c. A crafted ENIP/CPF message can supply an attacker-controlled item_count value that is not consistently validated against the remaining data_length of the CPF slice | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-18T17:18:48.846Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38719
No data.
Status : Received
Published: 2026-05-18T17:16:32.127
Modified: 2026-05-18T17:16:32.127
Link: CVE-2026-38719
No data.
OpenCVE Enrichment
Updated: 2026-05-18T17:30:05Z