{"vulnerability": "CVE-2026-35227", "sightings": [{"uuid": "2f9f2395-1e8d-4a48-aa24-2ac66ec4f44e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35227", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116560372971895683", "content": "#OT #Advisory VDE-2026-042CODESYS Modbus TCP Server - Improper resource management\nCODESYS Modbus is an add\u2011on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.#CVE CVE-2026-35227\nhttps://certvde.com/en/advisories/vde-2026-042/\n#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-05_vde-2026-042.json", "creation_timestamp": "2026-05-12T07:15:44.739351Z"}, {"uuid": "f6b41551-e95e-42ae-a0bf-8375c96dbb1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-35227", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlnfl43kmx2k", "content": "CVE-2026-35227 - Improper resource management in CODESYS Modbus TCP Server\nCVE ID : CVE-2026-35227\n \n Published : May 12, 2026, 7:14 a.m. | 1\u00a0hour, 10\u00a0minutes ago\n \n Description : An unauthenticated remote attacker may exhaust all available TCP connections in the CODESYS Modbu...", "creation_timestamp": "2026-05-12T08:45:21.676305Z"}]}