OPC UA User Password Edit Exploit

A vulnerability (CVE-2022-2967) has been discovered in Prosys OPC UA applications that enables attackers to gain unauthorized access to Prosys OPC UA Simulation Server or Modbus Server.

The exploit has been evaluated with CVSS Base Score 6.5 and Vector String CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H.

Details

The exploit enables a local privileged user to obtain the passwords of the users after they have been entered into the user interface of the OPC UA server applications and use them to authenticate respectively via the OPC UA interface.

The vulnerability was discovered by researchers at Purdue University, and CISA reported it as ICSA-22-349-01

Prosys OPC UA Products Affected

The vulnerability affects directly:

  • Prosys OPC UA Simulation Server 5.3.0 and earlier
  • Prosys OPC UA Modbus Server 1.4.18 and earlier

Fixed Products

The issue has been fixed in Simulation Server 5.4.0 and Modbus Server 1.4.20, and we encourage everyone to update to these versions.

Avoiding the Issue in Existing Products

The vulnerability occurs only when passwords are edited in the applications. If the applications are restarted after editing passwords, the exploit will not succeed, so that is a working mitigation.

It is also essential to ensure the physical security of the computers that run the OPC UA applications. Since this issue is only locally exploitable, proper physical security will mitigate the vulnerability.

More Security Information

You will find the currently announced security issues in Prosys OPC products from the blog under the #Security tag.

If you have any questions or comments, please don’t hesitate to contact us by email at sales@prosysopc.com or through our website contact form.

Headshot of Jouni Aro

Jouni Aro

Chief Technology Officer

Email: jouni.aro@prosysopc.com

Related Posts

Develop OPC UA Applications on Android with Prosys SDK

Develop OPC UA applications on Android with the Prosys OPC UA SDK for Java. This updated guide shows how to get started with Android SDK API 35, including a simple client example. Please note that testing on Android is limited, so full interoperability with all OPC UA systems cannot be guaranteed.

Read More »

Valio – Connecting Dairy Plant Automation with IT Using Prosys OPC UA Forge

At Valio, product quality and traceability requirements are at a very high level, highlighting the importance of smooth and reliable communication between different production systems. To meet these requirements, Prosys OPC developed the OPC UA standard based software Valio uses for integrating all their automation and manufacturing execution systems.

Read More »

Master’s Thesis Recap: OPC UA Role-Based Access Control in Industrial Automation

This master’s thesis recap examines how OPC UA Role-Based Access Control (RBAC) can be implemented in industrial automation. It compares directory integration with local role mappings, outlines their benefits and challenges, and presents findings from a simulated case study. The results highlight practical considerations for strengthening OT network security with OPC UA.

Read More »

Interested in this topic?

Get updated about new posts through our newsletter!