CVE-2020-27263

9.1 CRITICAL

📋 TL;DR

A heap-based buffer overflow vulnerability in multiple industrial OPC UA server products allows attackers to crash servers and potentially leak data by sending specially crafted OPC UA messages. This affects numerous industrial control system software from multiple vendors including KEPServerEX, ThingWorx, Rockwell Automation, GE Digital, and Software Toolbox. The vulnerability is present in default configurations and can be exploited remotely.

💻 Affected Systems

Products:
  • KEPServerEX
  • ThingWorx Kepware Server
  • ThingWorx Industrial Connectivity
  • OPC-Aggregator
  • Rockwell Automation KEPServer Enterprise
  • GE Digital Industrial Gateway Server
  • Software Toolbox TOP Server
Versions: KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity all versions, OPC-Aggregator all versions, GE Digital Industrial Gateway Server v7.68.804 and v7.66, Software Toolbox TOP Server all 6.x versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All affected products use the vulnerable OPC UA stack implementation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and disruption of industrial operations

🟠

Likely Case

Denial of service through server crashes and potential information disclosure via memory leaks

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation

🌐 Internet-Facing: HIGH - Exploitable remotely via network access to OPC UA port (typically 4840/tcp)
🏢 Internal Only: HIGH - Internal attackers or compromised systems can exploit this vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted OPC UA messages to the vulnerable service

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by vendor - check specific vendor advisories

Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-20-352-02

Restart Required: Yes

Instructions:

1. Identify affected products and versions. 2. Check vendor-specific patches. 3. Apply vendor-provided updates. 4. Restart affected services. 5. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to OPC UA ports (typically 4840/tcp) to trusted systems only

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port protocol="tcp" port="4840" accept'
netsh advfirewall firewall add rule name="Restrict OPC UA" dir=in action=allow protocol=TCP localport=4840 remoteip=TRUSTED_IP

Disable Unused OPC UA Interfaces

all

Disable OPC UA functionality if not required for operations

Check vendor documentation for disabling OPC UA interfaces

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to OPC UA ports
  • Deploy intrusion detection systems to monitor for OPC UA protocol anomalies

🔍 How to Verify

Check if Vulnerable:

Check installed version against affected version lists in ICSA-20-352-02 advisory

Check Version:

Varies by product - typically available in product administration interface or via vendor-specific commands

Verify Fix Applied:

Verify version is updated beyond affected ranges and test OPC UA connectivity

📡 Detection & Monitoring

Log Indicators:

  • Unexpected server crashes or restarts
  • Memory access violation errors in application logs
  • Unusual OPC UA connection attempts

Network Indicators:

  • Malformed OPC UA packets to port 4840/tcp
  • Unusual traffic patterns to OPC UA services

SIEM Query:

source="*opcua*" AND (event_type="crash" OR event_type="memory_violation")

🔗 References

📤 Share & Export