An unauthenticated remote attacker is able to exhaust all available TCP connections in the CODESYS EtherNet/IP adapter stack, preventing legitimate clients from establishing new connections.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 23 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker is able to exhaust all available TCP connections in the CODESYS EtherNet/IP adapter stack, preventing legitimate clients from establishing new connections. | |
| Title | Improper timeout handling in CODESYS EtherNetIP | |
| First Time appeared |
Codesys
Codesys codesys Ethernetip |
|
| Weaknesses | CWE-754 | |
| CPEs | cpe:2.3:a:codesys:codesys_ethernetip:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Codesys
Codesys codesys Ethernetip |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-04-23T13:54:51.863Z
Reserved: 2026-04-01T19:54:21.499Z
Link: CVE-2026-35225
No data.
Status : Received
Published: 2026-04-23T15:37:23.377
Modified: 2026-04-23T15:37:23.377
Link: CVE-2026-35225
No data.
OpenCVE Enrichment
No data.
Weaknesses