First published: Wed May 07 2025(Updated: )
Out-of-bounds Read vulnerability in unpack_response (session.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network.
Credit: prodsec@nozominetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
libplctag | >=2.0<=2.6.3 |
To fix this issue, it's suggested to update libplctag to v2.6.4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1399 is classified as a high severity vulnerability due to the potential for overread buffers leading to information disclosure.
To mitigate CVE-2025-1399, update libplctag to a version above 2.6.3 or apply any available security patches.
CVE-2025-1399 affects libplctag versions from 2.0 through 2.6.3.
CVE-2025-1399 is an out-of-bounds read vulnerability found in the unpack_response function of libplctag.
Yes, CVE-2025-1399 can be exploited via network connections, potentially allowing attackers to read sensitive data.