Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-32170", "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "state": "PUBLISHED", "assignerShortName": "zdi", "dateReserved": "2023-05-03T20:10:47.063Z", "datePublished": "2024-05-03T01:56:47.972Z", "dateUpdated": "2024-08-02T15:10:23.906Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi", "dateUpdated": "2024-05-03T01:56:47.972Z"}, "title": "Unified Automation UaGateway OPC UA Server Improper Input Validation Denial-of-Service Vulnerability", "descriptions": [{"lang": "en", "value": "Unified Automation UaGateway OPC UA Server Improper Input Validation Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation UaGateway. User interaction is required to exploit this vulnerability in that the target must choose to accept a client certificate.\n\nThe specific flaw exists within the processing of client certificates. The issue results from the lack of proper validation of certificate data. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20494."}], "affected": [{"vendor": "Unified Automation", "product": "UaGateway", "versions": [{"version": "1.5.12.482", "status": "affected"}], "defaultStatus": "unknown"}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "type": "CWE"}]}], "references": [{"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-775/", "name": "ZDI-23-775", "tags": ["x_research-advisory"]}, {"url": "https://documentation.unified-automation.com/uagateway/1.5.14/CHANGELOG.txt", "name": "vendor-provided URL", "tags": ["vendor-advisory"]}], "dateAssigned": "2023-05-03T15:16:43.148-05:00", "datePublic": "2023-05-31T18:58:55.758-05:00", "source": {"lang": "en", "value": "\u0110\u1ed7 Minh Tu\u1ea5n (@tuanit96) and Tran Van Khang (@khangkito) of STAR Labs SG Pte. Ltd."}, "metrics": [{"format": "CVSS", "cvssV3_0": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM"}}]}, "adp": [{"affected": [{"vendor": "unified-automation", "product": "uagateway", "cpes": ["cpe:2.3:a:unified-automation:uagateway:1.5.12.482:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "1.5.12.482", "status": "affected"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-07-03T14:21:35.494739Z", "id": "CVE-2023-32170", "options": [{"Exploitation": "poc"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-07-10T15:33:07.225Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T15:10:23.906Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-775/", "name": "ZDI-23-775", "tags": ["x_research-advisory", "x_transferred"]}, {"url": "https://documentation.unified-automation.com/uagateway/1.5.14/CHANGELOG.txt", "name": "vendor-provided URL", "tags": ["vendor-advisory", "x_transferred"]}]}]}}