The OPC UA Legacy Java Stack before 6f176f2 enables an attacker to block OPC UA server applications via uncontrolled resource consumption so that they can no longer serve client applications.
References
Configurations
History
21 Nov 2024, 08:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-32787.pdf - Patch, Vendor Advisory | |
References | () https://github.com/OPCFoundation/UA-Java-Legacy - Product | |
References | () https://github.com/OPCFoundation/UA-Java-Legacy/commit/6f176f2b445a27c157f1a32f225accc9ce8873c0 - Patch | |
Summary |
|
02 Apr 2024, 14:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:prosysopc:ua_historian:*:*:*:*:*:*:*:* cpe:2.3:a:prosysopc:ua_simulation_server:*:*:*:*:*:*:*:* cpe:2.3:a:prosysopc:ua_modbus_server:*:*:*:*:*:*:*:* |
|
First Time |
Prosysopc ua Simulation Server
Prosysopc Prosysopc ua Historian Prosysopc ua Modbus Server |
Information
Published : 2023-05-15 15:15
Updated : 2024-11-21 08:04
NVD link : CVE-2023-32787
Mitre link : CVE-2023-32787
CVE.ORG link : CVE-2023-32787
JSON object : View
Products Affected
opcfoundation
- ua_java_legacy
prosysopc
- ua_modbus_server
- ua_historian
- ua_simulation_server
CWE
CWE-400
Uncontrolled Resource Consumption