CVE-2021-27434
📋 TL;DR
This vulnerability in Unified Automation .NET based OPC UA Client/Server SDK allows attackers to trigger a stack overflow via uncontrolled recursion. Affected systems include industrial control systems using vulnerable versions of this SDK for OPC UA communications.
💻 Affected Systems
- Unified Automation .NET based OPC UA Client/Server SDK Bundle
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash leading to denial of service in industrial control environments, potentially disrupting critical operations.
Likely Case
Service disruption through stack overflow crashes affecting OPC UA communications in industrial environments.
If Mitigated
Limited impact with proper network segmentation and monitoring in place.
🎯 Exploit Status
The vulnerability requires sending specially crafted OPC UA messages to trigger the recursion.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V3.0.8 or later
Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-21-133-04
Restart Required: Yes
Instructions:
1. Download Unified Automation .NET OPC UA SDK version 3.0.8 or later. 2. Replace vulnerable SDK components. 3. Recompile applications using the updated SDK. 4. Restart affected services and applications.
🔧 Temporary Workarounds
Network Segmentation
allIsolate OPC UA systems from untrusted networks using firewalls and network segmentation.
OPC UA Security Configuration
allImplement OPC UA security best practices including certificate-based authentication and message signing.
🧯 If You Can't Patch
- Implement strict network access controls to limit OPC UA traffic to trusted sources only.
- Monitor for abnormal OPC UA message patterns and stack overflow events in system logs.
🔍 How to Verify
Check if Vulnerable:
Check SDK version in application dependencies or installed components for versions 3.0.7 or earlier.
Check Version:
Check application configuration files or SDK installation directory for version information.
Verify Fix Applied:
Verify SDK version is 3.0.8 or later and test OPC UA functionality with normal operations.
📡 Detection & Monitoring
Log Indicators:
- Stack overflow errors in application logs
- Abnormal OPC UA message processing errors
- Service crashes related to OPC UA components
Network Indicators:
- Unusual volume of OPC UA messages from single sources
- Malformed OPC UA protocol messages
SIEM Query:
source="OPC-UA" AND (event_type="stack_overflow" OR event_type="service_crash")