CVE-2023-28831
high-risk
Published 2023-09-12
The OPC UA implementations (ANSI C and C++) in affected products contain an integer overflow vulnerability that could cause the application to run into an infinite loop during certificate validation. This could allow an unauthenticated remote attacker to create a denial of service condition by sending a specially crafted certificate.
Do I need to act?
-
0.64% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Simatic Cloud Connect 7 Cc712 Firmware
Simatic Cloud Connect 7 Cc716 Firmware
Simatic Drive Controller Cpu 1504D Tf Firmware
Simatic Drive Controller Cpu 1507D Tf Firmware
Simatic Et 200Sp Open Controller Cpu Firmware
Simatic S7-1200 Cpu Firmware
Simatic S7-1500 Cpu 1510Sp-1 Pn Firmware
Simatic S7-1500 Cpu 1510Sp F-1 Pn Firmware
Simatic S7-1500 Cpu 1511-1 Pn Firmware
Simatic S7-1500 Cpu 1511C-1 Pn Firmware
Simatic S7-1500 Cpu 1511F-1 Pn Firmware
Simatic S7-1500 Cpu 1511T-1 Pn Firmware
Simatic S7-1500 Cpu 1511Tf-1 Pn Firmware
Simatic S7-1500 Cpu 1512C-1 Pn Firmware
Simatic S7-1500 Cpu 1512Sp-1 Pn Firmware
Simatic S7-1500 Cpu 1512Sp F-1 Pn Firmware
Simatic S7-1500 Cpu 1513-1 Pn Firmware
Simatic S7-1500 Cpu 1513F-1 Pn Firmware
Simatic S7-1500 Cpu 1513R-1 Pn Firmware
Simatic S7-1500 Cpu 1514Sp-2 Pn Firmware
Affected Vendors
References (8)
Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-711309.pdf
Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-711309.pdf
56
/ 100
high-risk
Severity
26/34 · High
Exploitability
2/34 · Minimal
Exposure
28/34 · Critical