SYT-2023-5: Improper access control vulnerability in OPC Suite

Publisher: Softing Industrial Automation GmbH Document category: csaf_security_advisory
Initial release date: 2023-11-29T13:17:39.103Z Engine: Secvisogram 2.2.16
Current release date: 2023-11-29T13:17:39.103Z Build Date: 2023-12-01T13:18:04.701Z
Current version: 1.0.0 Status: final
CVSSv3.1 Base Score: 5.6 Severity: medium
Original language: en-US Language:
Also referred to:

Vulnerabilities

(CVE-2023-37572)

OSF_discovery service is started with weak permissions. The service executable could be changed or the service could be deleted.

CWE: CWE-284:Improper Access Control
Discovery date: 2022-10-14T10:00:00.000Z

Product status

Known affected
Product CVSS-Vector CVSS Base Score
Softing OPC Suite <= V5.25 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L 5.6
Fixed

Acknowledgments

Softing Industrial Automation GmbH

Namespace: https://industrial.softing.com

Softing PSIRT - contact us at [email protected]

Revision history

Version Date of the revision Summary of the revision
1.0.0 2023-11-29T13:17:39.103Z Initial version

Disclaimer

The information provided in this disclosure is provided "as is" without warranty of any kind. Softing disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Softing or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Softing or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.