PTC OPC UA Server Multiple vulnerabilities

critical Nessus Plugin ID 149522
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

An OPC UA server on the remote host is affected by multiple vulnerabilities.

Description

An OPC UA server running on the remote host is affected by at least one of the following vulnerabilities :

- A stack-based overflow vulnerability exists in the PTC ThingWorx Edge server due to improper validation of user-supplied data when decoding OPC UA strings. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to cause a denial of service condition or the execution of arbitrary code.
(CVE-2020-27265)

- A heap-based overflow vulnerability exists in the PTC ThingWorx Edge server when decoding OPC UA strings. An unauthenticated, remote attacker can exploit this to crash the server and potentially leak data. (CVE-2020-27263)

- A use-after-free vulnerability exists in the PTC Kepware KEPServerEX server. An unauthenticated, remote attacker can exploit this to crash the server. (CVE-2020-27267)

Note that this plugin may not detect all affected devices due to the variety of affected products from multiple vendors.

Solution

Affected PTC OPC UA products can be used in products from other vendors. See the ICS-CERT advisory for solution.

See Also

https://www.ptc.com/en/support/article/cs334963

https://us-cert.cisa.gov/ics/advisories/icsa-20-352-02

http://www.nessus.org/u?3fb9bd75

Plugin Details

Severity: Critical

ID: 149522

File Name: ptc_opcua_multi_vulns.nbin

Version: 1.4

Type: remote

Family: SCADA

Published: 5/17/2021

Updated: 7/12/2021

Dependencies: opcua_tcp_detect.nbin

Configuration: Enable paranoid mode

Risk Information

CVSS Score Source: CVE-2020-27265

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

Required KB Items: Services/opcua_tcp, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 1/5/2021

Vulnerability Publication Date: 1/5/2021

Reference Information

CVE: CVE-2020-27263, CVE-2020-27265, CVE-2020-27267

ICSA: 20-352-02