First published: Fri May 03 2024(Updated: )
Softing edgeConnector Siemens ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing edgeConnector Siemens. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of OPC UA ConditionRefresh requests. By sending a large number of requests, an attacker can consume all available resources on the server. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20498.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Softing edgeConnector |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27334 is classified as a denial-of-service vulnerability that can severely impact the availability of affected systems.
To mitigate CVE-2023-27334, it is essential to apply the latest security patches provided by Softing for edgeConnector Siemens.
CVE-2023-27334 affects all installations of Softing edgeConnector Siemens.
No, CVE-2023-27334 can be exploited by remote attackers without requiring authentication.
CVE-2023-27334 is a condition refresh resource exhaustion vulnerability leading to a denial-of-service.