SYT-2023-2: Bypass of limitations and relative path transversal vulnerability in OPC UA C++ SDK and Secure Integration Server

Publisher: Softing Industrial Automation GmbH Document category: csaf_security_advisory
Initial release date: 2023-05-06T07:00:00.000Z Engine: Secvisogram .2.2.15
Current release date: 2023-11-29T12:06:44.535Z Build Date: 2023-11-29T12:06:44.535Z
Current version: 2.0.0 Status: final
CVSSv3.1 Base Score: 7.7 Severity: high
Original language: en-US Language:
Also referred to:

Vulnerabilities

(CVE-2023-29377)

The OPC UA file object implementation allows to bypass the separation between OPC UA namespaces, limitations on assignment of directory path to FileDirectory OPC UA objects and limitations on assignment of the file path to File OPC UA objects. In combination with CVE-2023-29378 the server gives read and write access to local files which could be used for remote code excecution.

CWE: CWE-22:Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Discovery date: 2022-10-14T10:00:00.000Z

Product status

Known affected
Product CVSS-Vector CVSS Base Score
Softing OPC UA C++ SDK <= 6.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L 7.7
Softing Secure Integration Server <= V1.22 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L 7.7
Fixed

Acknowledgments

(CVE-2023-29378)

The OPC UA FileDirectory and File object implementation does not check for relative path traversal. In combination with CVE-2023-29377 the server gives read and write access to local files which could be used for remote code excecution.

CWE: CWE-23:Relative Path Traversal

Product status

Known affected
Product CVSS-Vector CVSS Base Score
Softing OPC UA C++ SDK <= 6.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L 7.7
Softing Secure Integration Server <= V1.22 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L 7.7
Fixed

Acknowledgments

Softing Industrial Automation GmbH

Namespace: https://industrial.softing.com

Softing PSIRT - contact us at [email protected]

Revision history

Version Date of the revision Summary of the revision
1.0.0 2023-06-05T07:00:00.000Z Initial version
2.0.0 2023-11-29T12:06:44.535Z Fix for Secure Integration Server

Disclaimer

The information provided in this disclosure is provided "as is" without warranty of any kind. Softing disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Softing or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Softing or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.