CVE-2022-26077
Open Automation Software vulnerability analysis and mitigation

Overview

A cleartext transmission of sensitive information vulnerability exists in the OAS Engine configuration communications functionality of Open Automation Software OAS Platform V16.00.0112. The vulnerability, identified as CVE-2022-26077, was discovered by Jared Rittle of Cisco Talos and publicly disclosed on May 25, 2022. The vulnerability affects the Open Automation Software OAS Platform version 16.00.0112, which is designed to facilitate data transfer between various proprietary devices and applications (Talos Intelligence).

Technical details

By default, all configuration communication with the OAS Platform is sent in cleartext over TCP/58727. When commands requiring OAS User account authentication are sent, or any request from a logged-in OAS Configuration Utility is made, the username and base64 password hash is included in the message. The vulnerability has been assigned a CVSSv3 score of 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is classified under CWE-319 (Cleartext Transmission of Sensitive Information) (Talos Intelligence).

Impact

If an attacker is sniffing the network during transmission, they could extract username and password hash information and subsequently use it to successfully send additional configuration commands that require credentials. This exposure of sensitive authentication data could lead to unauthorized access to the system (Talos Intelligence, Threatpost).

Mitigation and workarounds

To mitigate this vulnerability, it is recommended to ensure proper network segmentation is in place to minimize potential attacker access to the network on which the OAS Platform communicates. Additionally, organizations should use a dedicated user account to run the OAS Platform with minimal necessary permissions. The vendor has worked with Cisco Talos to resolve these issues and updates are available for affected customers (Talos Intelligence).

Additional resources


SourceThis report was generated using AI

Related Open Automation Software vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-34998HIGH8.1
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34353HIGH7.5
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34317MEDIUM6.5
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-35124MEDIUM4.3
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34994MEDIUM4.3
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management