### [CVE-2022-37013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37013) ![](https://img.shields.io/static/v1?label=Product&message=OPC%20UA%20C%2B%2B%20Demo%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20('Infinite%20Loop')&color=brighgreen) ### Description This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server 1.7.6-537 [with vendor rollup]. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of certificates. A crafted certificate can force the server into an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-17203. ### POC #### Reference No PoCs from references. #### Github - https://github.com/claroty/opcua-exploit-framework