CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
46.6%
All versions of package opcua; all versions of package asyncua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.
Vendor | Product | Version | CPE |
---|---|---|---|
asyncua_project | asyncua | * | cpe:2.3:a:asyncua_project:asyncua:*:*:*:*:*:python:*:* |
opcua_project | opcua | * | cpe:2.3:a:opcua_project:opcua:*:*:*:*:*:python:*:* |
github.com/advisories/GHSA-mfpj-3qhm-976m
github.com/FreeOpcUa/opcua-asyncio/commit/01c7acf047887b62d979cd4373d370e72a4b9057
github.com/FreeOpcUa/python-opcua/issues/1466
nvd.nist.gov/vuln/detail/CVE-2022-25304
security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-2988731
security.snyk.io/vuln/SNYK-PYTHON-OPCUA-2988730