### [CVE-2024-6098](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6098) ![](https://img.shields.io/static/v1?label=Product&message=IGS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Kepware%20KEPServerEX&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Kepware%20ThingWorx%20Kepware%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=TOP%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20V6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20V7.6x%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&color=brighgreen) ### Description When performing an online tag generation to devices which communicate using the ControlLogix protocol, a machine-in-the-middle, or a device that is not configured correctly, could deliver a response leading to unrestricted or unregulated resource allocation. This could cause a denial-of-service condition and crash the Kepware application. By default, these functions are turned off, yet they remain accessible for users who recognize and require their advantages. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds