技术文章 - CS397286
PTC Kepware 产品中发现的安全漏洞 - CVE-2023-3825
已修改: 26-Jul-2023
适用于
- ThingWorx Kepware Server 8.0 to 6.14
- KEPServerEX 6.0.2107.0 to 6.14
- Zero Day Initiative in collaboration with security researcher Claroty published results from PWN2OWN Miami in which Claroty successfully demonstrated a DoS attack on KEPServerEX by performing resource exhaustion
- The attack vector leveraged during the event involved the creation of an un-authenticated a bad-acting OPC UA Client
- Standard controls available in the product and outlined in the Secure Deployment guide are sufficient to mitigate this vulnerability
- Kepware will be producing a fix for the vulnerability irrespective of authentication that will remediate this vulnerability. This fix will be part of the KEPServerEX version 6.15 release in the second half of 2023
说明
- 零日计划与安全研究人员 Claroty Team82 合作发布了 PWN2OWN 迈阿密的结果,其中 Claroty 通过执行资源耗尽成功演示了对 KEPServerEX 的 DoS 攻击
- CVSS 3.1 分数:7.5 高
- CVSS 3.1 矢量字符串:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- CWE:CWE-400 不受控制的资源消耗
- KEPServerEX v6.13.250.0 或更低版本容易被读取递归定义的对象,从而导致不受控制的资源消耗
- KEPServerEX 使用 OPC UA,该协议定义了可以嵌套创建复杂数组的各种对象类型
- 它不会执行检查来查看此类对象是否是递归定义的,因此攻击可能会发送恶意创建的消息,解码器将尝试解码该消息,直到堆栈溢出且设备崩溃
- 常见漏洞和披露:CVE-2023-3825 已分配给此漏洞
研究人员归属:Claroty Team82
这是文章 397286 的 PDF 版本,可能已过期。最新版本 CS397286