Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-32172", "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "state": "PUBLISHED", "assignerShortName": "zdi", "dateReserved": "2023-05-03T20:10:47.065Z", "datePublished": "2024-05-03T01:56:49.400Z", "dateUpdated": "2024-08-02T15:10:23.685Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi", "dateUpdated": "2024-05-03T01:56:49.400Z"}, "title": "Unified Automation UaGateway OPC UA Server Use-After-Free Denial-of-Service Vulnerability", "descriptions": [{"lang": "en", "value": "Unified Automation UaGateway OPC UA Server Use-After-Free Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation UaGateway. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the ImportXML function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20497."}], "affected": [{"vendor": "Unified Automation", "product": "UaGateway", "versions": [{"version": "1.5.12.482", "status": "affected"}], "defaultStatus": "unknown"}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-416", "description": "CWE-416: Use After Free", "type": "CWE"}]}], "references": [{"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-777/", "name": "ZDI-23-777", "tags": ["x_research-advisory"]}, {"url": "https://documentation.unified-automation.com/uagateway/1.5.14/CHANGELOG.txt", "name": "vendor-provided URL", "tags": ["vendor-advisory"]}], "dateAssigned": "2023-05-03T15:16:43.162-05:00", "datePublic": "2023-05-31T18:59:09.188-05:00", "source": {"lang": "en", "value": "Claroty Research - Team82 - Uri Katz, Noam Moshe, Vera Mens, Sharon Brizinov"}, "metrics": [{"format": "CVSS", "cvssV3_0": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM"}}]}, "adp": [{"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-07-03T16:00:50.859225Z", "id": "CVE-2023-32172", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-07-03T16:00:56.254Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T15:10:23.685Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-777/", "name": "ZDI-23-777", "tags": ["x_research-advisory", "x_transferred"]}, {"url": "https://documentation.unified-automation.com/uagateway/1.5.14/CHANGELOG.txt", "name": "vendor-provided URL", "tags": ["vendor-advisory", "x_transferred"]}]}]}}