First published: Wed Mar 29 2023(Updated: )
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server 1.7.6-537 [with vendor rollup]. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of certificates. A crafted certificate can force the server into an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-17203.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Unified-automation Opc Ua C\+\+ Demo Server | =1.7.6.537 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37013 is a vulnerability that allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server 1.7.6-537 [with vendor rollup].
CVE-2022-37013 has a severity rating of 7.5 (high).
An attacker can exploit CVE-2022-37013 by sending specially crafted requests to the affected server, causing it to enter an infinite loop and creating a denial-of-service condition.
No, authentication is not required to exploit CVE-2022-37013.
Currently, there is no known fix for CVE-2022-37013. It is recommended to apply the vendor's updates once they become available.