CVE-2023-26150
Python vulnerability analysis and mitigation

Overview

CVE-2023-26150 affects versions of the asyncua package before 0.9.96, exposing an Improper Authentication vulnerability. The issue allows unauthorized access to the OPC UA Address Space without requiring encryption and authentication. The vulnerability was discovered during PhD research experiments and was disclosed on June 9, 2023 (Snyk Security).

Technical details

The vulnerability stems from missing security checks in the OPC UA implementation. In OPC UA, there are two security layers: the secure channel layer (handling encryption, signatures, and application authentication) and the session layer (handling user authentication and authorization). The vulnerability allows bypassing both security layers by sending a hello message, creating an unsecured channel, and establishing a session without activation. This enables unauthorized access to all services that should require an active authenticated session (GitHub Issue).

Impact

The vulnerability allows unauthorized users to access all data on the server if they know the IP address. Attackers can read and write nodes using regular Read and Write Requests without proper authentication, leading to potential data exposure and unauthorized modifications (Snyk Security).

Mitigation and workarounds

The vulnerability was fixed in version 0.9.96 of the asyncua package. The fix implements proper session activation checks for all services that require an active session. Users should upgrade to version 0.9.96 or higher to mitigate this vulnerability (GitHub Release).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management