Advisory Details

August 9th, 2023

(0Day) (Pwn2Own) Softing Secure Integration Server FileDirectory OPC UA Object Arbitrary File Creation Vulnerability

ZDI-23-1062
ZDI-CAN-20549

CVE ID CVE-2023-39480
CVSS SCORE 4.4, AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N
AFFECTED VENDORS Softing
AFFECTED PRODUCTS Secure Integration Server
VULNERABILITY DETAILS

This vulnerability allows remote attackers to create arbitrary files on affected installations of Softing Secure Integration Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.

The specific flaw exists within the handling of FileDirectory OPC UA Objects. The issue results from allowing unauthorized access to the filesystem. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

ADDITIONAL DETAILS

02/16/23 – The ZDI reported this vulnerability to the vendor during the Pwn2Own Miami contest.

02/20/23 – The vendor states they would review and report back with the security advisories.

03/08/23 – The vendor requested CVE Numbers.

03/15/23 – ZDI provided the vendor with CVE numbers.

07/31/23 – ZDI asked for an update.

08/03/23 – ZDI asked for an update.

08/07/23 – The ZDI asked for an update and informed the vendor that we are publishing this case as a zero-day advisory on 08/09/23.

-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application.


DISCLOSURE TIMELINE
  • 2023-02-23 - Vulnerability reported to vendor
  • 2023-08-09 - Coordinated public release of advisory
CREDIT Claroty Research - Team82 - Uri Katz, Noam Moshe, Vera Mens, Sharon Brizinov
BACK TO ADVISORIES