Vulnerability Description
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server 1.7.6-537 [with vendor rollup]. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of certificates. A crafted certificate can force the server into an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-17203.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Unified-Automation | Opc Ua C\+\+ Demo Server | 1.7.6.537 |
Related Weaknesses (CWE)
References
- https://documentation.unified-automation.com/uasdkcpp/1.7.7/CHANGELOG.txtRelease Notes
- https://www.zerodayinitiative.com/advisories/ZDI-22-1029/Third Party AdvisoryVDB Entry
- https://documentation.unified-automation.com/uasdkcpp/1.7.7/CHANGELOG.txtRelease Notes
- https://www.zerodayinitiative.com/advisories/ZDI-22-1029/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2022-37013?
CVE-2022-37013 is a vulnerability with a CVSS score of 7.5 (HIGH). This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server 1.7.6-537 [with vendor rollup]. Authentication...
How severe is CVE-2022-37013?
CVE-2022-37013 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-37013?
Check the references section above for vendor advisories and patch information. Affected products include: Unified-Automation Opc Ua C\+\+ Demo Server.