PTC OPC UA Server Multiple vulnerabilities

critical Nessus Plugin ID 149522

Synopsis

An OPC UA server on the remote host is affected by multiple vulnerabilities.

Description

An OPC UA server running on the remote host is affected by at least one of the following vulnerabilities :

- A stack-based overflow vulnerability exists in the PTC ThingWorx Edge server due to improper validation of user-supplied data when decoding OPC UA strings. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to cause a denial of service condition or the execution of arbitrary code.
(CVE-2020-27265)

- A heap-based overflow vulnerability exists in the PTC ThingWorx Edge server when decoding OPC UA strings. An unauthenticated, remote attacker can exploit this to crash the server and potentially leak data. (CVE-2020-27263)

- A use-after-free vulnerability exists in the PTC Kepware KEPServerEX server. An unauthenticated, remote attacker can exploit this to crash the server. (CVE-2020-27267)

Note that this plugin may not detect all affected devices due to the variety of affected products from multiple vendors.

Solution

Affected PTC OPC UA products can be used in products from other vendors. See the ICS-CERT advisory for solution.

See Also

https://www.ptc.com/en/support/article/cs334963

https://us-cert.cisa.gov/ics/advisories/icsa-20-352-02

http://www.nessus.org/u?3fb9bd75

Plugin Details

Severity: Critical

ID: 149522

File Name: ptc_opcua_multi_vulns.nbin

Version: 1.14

Type: remote

Family: SCADA

Published: 5/17/2021

Updated: 7/19/2022

Configuration: Enable paranoid mode

Risk Information

VPR

Risk Factor: Medium

Score: 6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2020-27265

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

Required KB Items: Services/opcua_tcp, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 1/5/2021

Vulnerability Publication Date: 1/5/2021

Reference Information

CVE: CVE-2020-27263, CVE-2020-27265, CVE-2020-27267

ICSA: 20-352-02