An unauthenticated remote attacker may use an...
High severity
Unreviewed
Published
Jun 4, 2025
to the GitHub Advisory Database
•
Updated Jun 4, 2025
Description
Published by the National Vulnerability Database
Jun 4, 2025
Published to the GitHub Advisory Database
Jun 4, 2025
Last updated
Jun 4, 2025
An unauthenticated remote attacker may use an uncontrolled resource consumption in the IEC 61131 program of the affected products by creating large amounts of network traffic that needs to be handled by the ILC. This results in a Denial-of-Service of the device.
References