PTC’s KEPServerEX Versions 6.0 to 6.14.263 are vulnerable to being made to read a recursively defined object that leads to uncontrolled resource consumption. KEPServerEX uses OPC UA, a protocol which defines various object types that can be nested to create complex arrays. It does not implement a check to see if such an object is recursively defined, so an attack could send a maliciously created message that the decoder would try to decode until the stack overflowed and the device crashed.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 21 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-10-21T18:15:51.966Z

Reserved: 2023-07-21T20:08:42.706Z

Link: CVE-2023-3825

cve-icon Vulnrichment

Updated: 2024-08-02T07:08:50.528Z

cve-icon NVD

Status : Modified

Published: 2023-07-31T23:15:10.437

Modified: 2024-11-21T08:18:09.247

Link: CVE-2023-3825

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.