AFFECTED PRODUCTS AND SOLUTION
Affected Product |
CVE |
Affected Versions |
Fixed Version |
KEPServer |
CVE-2023-3825 |
6.0 - 6.14.263 |
6.15 |
SECURITY ISSUE DETAILS
Rockwell Automation received a report from PTC regarding a security issue discovered by Security Researchers of Claroty Team82.
Rockwell Automation uses the latest version of the CVSS scoring system to assess the security issues.
CVE-2023-3825 IMPACT
KEPServerEX Versions 6.0 to 6.14.263 are open to being made to read a repeatedly defined object that leads to uncontrolled resource consumption. KEPServerEX uses OPC UA, a protocol which defines various object types that can be stored to create complex arrays. It does not apply a check to see if such an object is recursively defined. An attacker could send a maliciously created message that the decoder would try to decode until the stack overflowed and the device crashed.
CVSS 3.1 Base Score: 7.5
CVSS 3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-400: Uncontrolled Resource Consumption
Known Exploited Vulnerability (KEV) database: No
Mitigations and Workarounds
Customers using the affected software should use risk mitigations.
· For information on Security Risks and how to reduce risks, customers should use our suggested security best practices.
Customers can use Stakeholder-Specific Vulnerability Categorization to create more environment-specific categories.
ADDITIONAL RESOURCES
· CS405439 - Security vulnerabilities identified in PTC Kepware products - November 2023
Glossary:
Claroty Team82: a research arm that provides vulnerability and threat research to customers and defenders of industrial networks worldwide
KEPServerEX: connectivity platform that provides a single source of industrial automation
Known Exploited Vulnerability (KEV) database: an official list of security flaws that attackers have actively exploited