First published: Mon Jul 31 2023(Updated: )
PTC’s KEPServerEX Versions 6.0 to 6.14.263 are vulnerable to being made to read a recursively defined object that leads to uncontrolled resource consumption. KEPServerEX uses OPC UA, a protocol which defines various object types that can be nested to create complex arrays. It does not implement a check to see if such an object is recursively defined, so an attack could send a maliciously created message that the decoder would try to decode until the stack overflowed and the device crashed.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Kepware KEPServerEX | >=6.0.0<=6.14.263 | |
PTC KEPServerEX: Versions 6.0 to 6.14.263 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3825 is a vulnerability in PTC's KEPServerEX versions 6.0 to 6.14.263 that allows an attacker to make the server read a recursively defined object, leading to uncontrolled resource consumption.
The severity of CVE-2023-3825 is high, with a CVSS score of 7.5.
PTC's KEPServerEX uses OPC UA, a protocol that defines various object types.
The vulnerability allows an attacker to cause uncontrolled resource consumption which can lead to service disruption or denial of service.
To fix CVE-2023-3825, it is recommended to update KEPServerEX to a version that is higher than 6.14.263.