Advisory Details

May 4th, 2023

(Pwn2Own) OPC Foundation UA .NET Standard ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability

ZDI-23-548
ZDI-CAN-20505

CVE ID CVE-2023-27321
CVSS SCORE 7.5, AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AFFECTED VENDORS OPC Foundation
AFFECTED PRODUCTS UA .NET Standard
VULNERABILITY DETAILS

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of OPC UA ConditionRefresh requests. By sending a large number of requests, an attacker can consume all available resources on the server. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

ADDITIONAL DETAILS OPC Foundation has issued an update to correct this vulnerability. More details can be found at:
https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-27321.pdf
DISCLOSURE TIMELINE
  • 2023-02-22 - Vulnerability reported to vendor
  • 2023-05-04 - Coordinated public release of advisory
CREDIT Claroty Research - Team82 - Uri Katz, Noam Moshe, Vera Mens, Sharon Brizinov
BACK TO ADVISORIES