CVE-2026-38719
Description
OpENer v2.3-558-g1e99582 contains an out-of-bounds read vulnerability in the Common Packet Format (CPF) parser, specifically in CreateCommonPacketFormatStructure() in source/src/enet_encap/cpf.c. A crafted ENIP/CPF message can supply an attacker-controlled item_count value that is not consistently validated against the remaining data_length of the CPF slice
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
OpENer v2.3-558-g1e99582 has an out-of-bounds read in its CPF parser due to insufficient validation of item_count, allowing crafted ENIP messages to cause memory disclosure.
Vulnerability
The vulnerability resides in CreateCommonPacketFormatStructure() in source/src/enet_encap/cpf.c of OpENer v2.3-558-g1e99582 (commit 1e99582). The Common Packet Format (CPF) parser reads an attacker-controlled item_count value from the incoming ENIP message without consistently validating subsequent reads against the remaining data_length of the CPF slice. This allows an out-of-bounds read when item_count is larger than the available data. [1][2]
Exploitation
An attacker with network access can send a crafted ENIP/CPF message containing a CPF slice with a manipulated item_count (e.g., 0xe801). The parser trusts this value and continues reading structured fields beyond the slice boundary, leading to an out-of-bounds read. No authentication or user interaction is required; the vulnerability is triggered during normal message processing. [2]
Impact
Successful exploitation results in an out-of-bounds read, potentially disclosing heap memory contents. This could leak sensitive information from the device's memory. The CVSS score is 6.2 (medium), indicating a moderate confidentiality impact. No code execution is reported. [2]
Mitigation
As of the publication date (2026-05-18), no official fix has been released. The issue is tracked in GitHub issue #558 [2]. Users should monitor the OpENer repository for a patched version. A workaround is to restrict network access to the device to trusted hosts only. [1][2]
- GitHub - EIPStackGroup/OpENer: OpENer is an EtherNet/IP stack for I/O adapter devices. It supports multiple I/O and explicit connections and includes objects and services for making EtherNet/IP-compliant products as defined in the ODVA specification.
- Potential out-of-bounds read in CPF parsing logic (Heap-Overflow)
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = v2.3-558-g1e99582
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.