Vulnerability Description
Inductive Automation Ignition ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of OPC UA ConditionRefresh requests. By sending a large number of requests, an attacker can consume all available resources on the server. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20499.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Inductiveautomation | Ignition | >= 8.1.0, < 8.1.33 |
Related Weaknesses (CWE)
References
- https://inductiveautomation.com/downloads/releasenotes/8.1.33Release Notes
- https://www.zerodayinitiative.com/advisories/ZDI-23-1050/Third Party Advisory
- https://inductiveautomation.com/downloads/releasenotes/8.1.33Release Notes
- https://www.zerodayinitiative.com/advisories/ZDI-23-1050/Third Party Advisory
FAQ
What is CVE-2023-39477?
CVE-2023-39477 is a vulnerability with a CVSS score of 7.5 (HIGH). Inductive Automation Ignition ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected insta...
How severe is CVE-2023-39477?
CVE-2023-39477 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-39477?
Check the references section above for vendor advisories and patch information. Affected products include: Inductiveautomation Ignition.