Advisory Details

August 8th, 2023

(0Day) (Pwn2Own) Inductive Automation Ignition ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability

ZDI-23-1050
ZDI-CAN-20499

CVE ID CVE-2023-39477
CVSS SCORE 7.5, (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
AFFECTED VENDORS Inductive Automation
AFFECTED PRODUCTS Ignition
VULNERABILITY DETAILS

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of OPC UA ConditionRefresh requests. By sending a large number of requests, an attacker can consume all available resources on the server. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.

ADDITIONAL DETAILS

01/20/23 – The ZDI reported this vulnerability to the vendor during the Pwn2Own Miami contest.

07/18/23 – The ZDI asked for an update.

08/01/23 – The vendor states this case does not require immediate servicing and is being tracked in their backlog.

08/01/23 – ZDI informed the vendor that the case will be published as a zero-day advisory on 08/08/23.

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application.


DISCLOSURE TIMELINE
  • 2023-02-22 - Vulnerability reported to vendor
  • 2023-08-08 - Coordinated public release of advisory
  • 2023-08-08 - Advisory Updated
CREDIT Claroty Research - Team82 - Uri Katz, Noam Moshe, Vera Vens, Sharon Brizinov
BACK TO ADVISORIES