cve/2022/CVE-2022-37013.md

18 lines
1.0 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-37013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37013)
![](https://img.shields.io/static/v1?label=Product&message=OPC%20UA%20C%2B%2B%20Demo%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20('Infinite%20Loop')&color=brighgreen)
### Description
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server 1.7.6-537 [with vendor rollup]. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of certificates. A crafted certificate can force the server into an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-17203.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/claroty/opcua-exploit-framework