CVE-2022-26303
Open Automation Software vulnerability analysis and mitigation

Overview

An external config control vulnerability exists in the OAS Engine SecureAddUser functionality of Open Automation Software (OAS) Platform V16.00.0112, identified as CVE-2022-26303. The vulnerability was discovered by Jared Rittle of Cisco Talos and publicly disclosed on May 25, 2022. This vulnerability affects the OAS Platform, which is designed to facilitate simplified data transfer between various proprietary devices and applications, including both software and hardware components (Talos Intelligence, Threatpost).

Technical details

The vulnerability has a CVSS v3 score of 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and is classified under CWE-306 (Missing Authentication for Critical Function). By sending a series of properly-formatted unauthenticated configuration messages to TCP port 58727, an attacker can create a new OAS user account and apply a custom Security Group. The vulnerability can be exploited through two main commands: SecureAddUser and SecureConfigValues, which allow for the creation of new user accounts and the application of custom security groups from an unauthenticated context (Talos Intelligence).

Impact

When successfully exploited, this vulnerability allows an attacker to create new user accounts with custom security group permissions on the OAS Platform. This access can be leveraged to make authenticated requests to the platform, potentially affecting critical infrastructure networks where OAS Platform is commonly deployed in industrial control systems (ICS), SCADA systems, and IoT devices (Threatpost).

Mitigation and workarounds

The primary mitigation strategy is to prevent access to the configuration port (TCP/58727 by default) when not actively configuring the OAS Platform. Additionally, organizations should use a dedicated user account to run the OAS Platform with minimal necessary permissions. Proper network segmentation is recommended to ensure adversaries have the lowest possible level of access to the network on which the OAS Platform communicates (Talos Intelligence).

Additional resources


SourceThis report was generated using AI

Related Open Automation Software vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-34998HIGH8.1
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34353HIGH7.5
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34317MEDIUM6.5
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-35124MEDIUM4.3
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34994MEDIUM4.3
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management