Vulnerability Description
OPC Foundation UA .NET Standard ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of OPC UA ConditionRefresh requests. By sending a large number of requests, an attacker can consume all available resources on the server. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20505.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opcfoundation | Ua-.Netstandard | < 1.4.371.86 |
Related Weaknesses (CWE)
References
- https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Vendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-23-548/Third Party Advisory
- https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Vendor Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-23-548/Third Party Advisory
FAQ
What is CVE-2023-27321?
CVE-2023-27321 is a vulnerability with a CVSS score of 7.5 (HIGH). OPC Foundation UA .NET Standard ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected ins...
How severe is CVE-2023-27321?
CVE-2023-27321 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-27321?
Check the references section above for vendor advisories and patch information. Affected products include: Opcfoundation Ua-.Netstandard.