CVE-2023-3825

PTC’s KEPServerEX Versions 6.0 to 6.14.263 are vulnerable to being made to read a recursively defined object that leads to uncontrolled resource consumption. KEPServerEX uses OPC UA, a protocol which defines various object types that can be nested to create complex arrays. It does not implement a check to see if such an object is recursively defined, so an attack could send a maliciously created message that the decoder would try to decode until the stack overflowed and the device crashed.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-02 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:kepware:kepserverex:*:*:*:*:*:*:*:*

History

04 Aug 2023, 16:48

Type Values Removed Values Added
References (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-02 - (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-02 - Third Party Advisory, US Government Resource
CWE CWE-400 CWE-787
First Time Kepware
Kepware kepserverex
CPE cpe:2.3:a:kepware:kepserverex:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

31 Jul 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-31 23:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-3825

Mitre link : CVE-2023-3825

CVE.ORG link : CVE-2023-3825


JSON object : View

Products Affected

kepware

  • kepserverex
CWE
CWE-787

Out-of-bounds Write

CWE-400

Uncontrolled Resource Consumption