Browse all 3 CVE security advisories affecting Modbus Tools. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Modbus Tools primarily serves industrial automation by facilitating communication between devices using the Modbus protocol. Historically, these tools have been vulnerable to remote code execution, buffer overflows, and authentication bypasses due to insufficient input validation and insecure design. The three recorded CVEs highlight risks like arbitrary command execution and privilege escalation in versions prior to 3.1.0. While no major public incidents have been documented, the persistent vulnerabilities in Modbus implementations pose significant risks to industrial control systems, where exploitation could lead to operational disruption or safety failures. Security remains a concern given the protocol's age and widespread deployment in critical infrastructure.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-4857 | Modbus Tools Modbus Poll mbp File mbpoll.exe buffer overflow — Modbus PollCWE-120 | 6.3 | Medium | 2022-12-30 |
| CVE-2022-4856 | Modbus Tools Modbus Slave mbs File mbslave.exe buffer overflow — Modbus SlaveCWE-120 | 6.3 | Medium | 2022-12-30 |
| CVE-2022-1068 | Modbus Tools Modbus Slave Stack-Based Buffer Overflow — Modbus SlaveCWE-121 | 5.5 | Medium | 2022-04-01 |
This page lists every published CVE security advisory associated with Modbus Tools. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.