OPC UA User Password Edit Exploit
A vulnerability (CVE-2022-2967) has been discovered in Prosys OPC UA applications that enables an attacker to gain unauthorized access to Prosys OPC UA Simulation Server or Modbus Server.
The exploit has been evaluated with CVSS Base Score 6.5 and Vector String CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H.
The exploit enables a local privileged user to obtain the passwords of the users after they have been entered in the user interface of the OPC UA server applications and use them to authenticate respectively via the OPC UA interface.
Prosys OPC UA products affected
The vulnerability affects directly:
- Prosys OPC UA Simulation Server 5.3.0 and earlier
- Prosys OPC UA Modbus Server 1.4.18 and earlier
Avoiding the issue in existing products
The vulnerability occurs only when passwords are edited in the applications. If the applications are restarted after editing passwords, the exploit will not succeed, so that is a working mitigation.
It is also very important to ensure the physical security of the computers that are run the OPC UA applications. Since this issue is only locally exploitable, proper physical securty will mitigate the vulnerability.
More security information
You will find the currently announced security issues in Prosys OPC products from the blog under the #Security tag.
You might also like to read about the OPC UA Security Process of the OPC Foundation.
Chief Technology Officer
Expertise and responsibility areas: OPC & OPC UA product development, project work and customer support
About Prosys OPC Ltd
Prosys OPC is a leading provider of professional OPC software and services with over 20 years of experience in the field. OPC and OPC UA (Unified Architecture) are communications standards used especially by industrial and high-tech companies.
Newest blog posts
Detailed overview of the demo presented at the OPC Foundation booth
A two-part step-by-step tutorial on how to write data changes on an OPC UA server using an OPC UA client.
Industry 4.0 analytics projects are going to be Significantly rising business in the next couple of years. Read how to bypass the most common cavepits and delivery projects succesfully.