CVE-2023-34998
Open Automation Software vulnerability analysis and mitigation

Overview

An authentication bypass vulnerability (CVE-2023-34998) was discovered in the OAS Engine functionality of Open Automation Software OAS Platform v18.00.0072. The vulnerability was disclosed on September 5, 2023, by Cisco Talos. The OAS Platform is commonly found in industrial operations and enterprise environments, enabling communication between various devices including PLCs, servers, files, databases, and IoT platforms (Talos Report, SecurityWeek).

Technical details

The vulnerability exists in the OAS Platform's Engine configuration management functionality. When a privileged request is sent by a legitimate administrator to the OAS Engine, the traffic is sent unencrypted across the wire. The credentials are wrapped in a UEP protobuf and included as a field inside the request. The vulnerability has a CVSS v3.1 base score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H and is classified under CWE-319 (Cleartext Transmission of Sensitive Information) ([Talos Report](https://talosintelligence.com/vulnerabilityreports/TALOS-2023-1770)).

Impact

A successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to the underlying system. The captured UEP protobuf remains valid until the associated user account is deleted, potentially enabling long-term unauthorized access. When combined with user creation and save configuration functionality, attackers could gain persistent access to the system ([Talos Report](https://talosintelligence.com/vulnerabilityreports/TALOS-2023-1770)).

Mitigation and workarounds

Access to the OAS Engine configuration server and its traffic should be restricted to exclusively those hosts authorized for configuration. The vulnerability has been fixed in version 19 of the OAS Platform, which can be downloaded from the vendor's website (Talos Report).

Additional resources


SourceThis report was generated using AI

Related Open Automation Software vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-34998HIGH8.1
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34353HIGH7.5
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34317MEDIUM6.5
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-35124MEDIUM4.3
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34994MEDIUM4.3
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management