PTC’s KEPServerEX Versions 6.0 to 6.14.263 are vulnerable to being made to read a recursively defined object that leads to uncontrolled resource consumption. KEPServerEX uses OPC UA, a protocol which defines various object types that can be nested to create complex arrays. It does not implement a check to see if such an object is recursively defined, so an attack could send a maliciously created message that the decoder would try to decode until the stack overflowed and the device crashed.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-02 | Third Party Advisory US Government Resource |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-02 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 08:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-02 - Third Party Advisory, US Government Resource |
04 Aug 2023, 16:48
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-02 - Third Party Advisory, US Government Resource | |
First Time |
Kepware
Kepware kepserverex |
|
CPE | cpe:2.3:a:kepware:kepserverex:*:*:*:*:*:*:*:* | |
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
31 Jul 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-31 23:15
Updated : 2024-11-21 08:18
NVD link : CVE-2023-3825
Mitre link : CVE-2023-3825
CVE.ORG link : CVE-2023-3825
JSON object : View
Products Affected
kepware
- kepserverex