An unauthenticated remote attacker is able to exhaust all available TCP connections in the CODESYS EtherNet/IP adapter stack, preventing legitimate clients from establishing new connections.
History

Thu, 23 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker is able to exhaust all available TCP connections in the CODESYS EtherNet/IP adapter stack, preventing legitimate clients from establishing new connections.
Title Improper timeout handling in CODESYS EtherNetIP
First Time appeared Codesys
Codesys codesys Ethernetip
Weaknesses CWE-754
CPEs cpe:2.3:a:codesys:codesys_ethernetip:*:*:*:*:*:*:*:*
Vendors & Products Codesys
Codesys codesys Ethernetip
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2026-04-23T13:54:51.863Z

Updated: 2026-04-23T15:35:43.352Z

Reserved: 2026-04-01T19:54:21.499Z

Link: CVE-2026-35225

cve-icon Vulnrichment

Updated: 2026-04-23T15:35:39.991Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-23T15:37:23.377

Modified: 2026-04-24T14:50:56.203

Link: CVE-2026-35225

cve-icon Redhat

No data.