CVE-2023-35124
Open Automation Software vulnerability analysis and mitigation

Overview

An information disclosure vulnerability (CVE-2023-35124) was discovered in the OAS Engine configuration management functionality of Open Automation Software OAS Platform v18.00.0072. The vulnerability was disclosed on September 5, 2023, and affects the configuration management component of the platform. The vulnerability allows an authenticated attacker to potentially disclose sensitive information through specially crafted network requests (Talos Report).

Technical details

The vulnerability exists in the OAS Configuration tool, which exposes functionality to load saved configurations from disk to authenticated application users. When a file that doesn't conform to the expected configuration format is selected through the remote file browser, the first 0x11 bytes of the file are leaked in the response error message. The vulnerability is exploited using a String protobuf as part of an authenticated request to specify the filename. The CVSS v3.1 base score is 3.1 (LOW) with vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N. The vulnerability is classified as CWE-209 (Information Exposure Through an Error Message) (Talos Report).

Impact

The vulnerability can lead to the disclosure of sensitive information through error messages. When exploited, the first 17 bytes (0x11) of non-conforming configuration files can be exposed to authenticated users, potentially revealing sensitive data (Talos Report).

Mitigation and workarounds

The vendor has released version v19 to address this vulnerability. As additional mitigation measures, it is recommended to restrict access to the OAS Engine configuration server and its traffic to only those hosts authorized for configuration. Furthermore, organizations should restrict read/write access for the OAS user to only locations that can safely be exposed to anyone on the network (Talos Report).

Additional resources


SourceThis report was generated using AI

Related Open Automation Software vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-34998HIGH8.1
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34353HIGH7.5
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34317MEDIUM6.5
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-35124MEDIUM4.3
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023
CVE-2023-34994MEDIUM4.3
  • Open Automation SoftwareOpen Automation Software
  • cpe:2.3:a:openautomationsoftware:oas_platform
NoNoSep 05, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management