CVE-2022-26026
📋 TL;DR
CVE-2022-26026 is a denial-of-service vulnerability in Open Automation Software OAS Platform's SecureConfigValues functionality. Attackers can send specially crafted network requests to trigger loss of communications, disrupting industrial control and automation systems. Organizations using OAS Platform V16.00.0112 are affected.
💻 Affected Systems
- Open Automation Software OAS Platform
📦 What is this software?
Oas Platform by Openautomationsoftware
⚠️ Risk & Real-World Impact
Worst Case
Complete loss of communications between OAS Platform components, disrupting industrial processes, manufacturing operations, or critical infrastructure monitoring.
Likely Case
Temporary service disruption requiring system restart, causing operational downtime and potential data loss in industrial environments.
If Mitigated
Minimal impact with proper network segmentation and monitoring; service can be quickly restored from backups.
🎯 Exploit Status
The vulnerability requires network access but no authentication; exploitation appears straightforward based on the description.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V16.00.0113 or later
Vendor Advisory: https://openautomationsoftware.com/security-advisories/
Restart Required: Yes
Instructions:
1. Download latest OAS Platform version from vendor portal. 2. Backup current configuration. 3. Install update following vendor instructions. 4. Restart OAS services. 5. Verify functionality.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to OAS Platform to only trusted systems using firewalls or network ACLs.
Disable Unnecessary Services
windowsIf SecureConfigValues functionality is not required, disable it according to vendor documentation.
🧯 If You Can't Patch
- Implement strict network access controls to limit which systems can communicate with OAS Platform
- Deploy intrusion detection systems to monitor for exploitation attempts and anomalous network traffic
🔍 How to Verify
Check if Vulnerable:
Check OAS Platform version in administration console or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\Open Automation Software\OAS\Version
Check Version:
reg query "HKLM\SOFTWARE\Open Automation Software\OAS" /v Version
Verify Fix Applied:
Confirm version is V16.00.0113 or later and test SecureConfigValues functionality remains operational.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed connection attempts to OAS services
- Service restart events in Windows Event Logs
- OAS process crashes
Network Indicators:
- Unusual traffic patterns to OAS Platform ports (typically 58727/TCP)
- Malformed packets targeting SecureConfigValues endpoint
SIEM Query:
source="windows" AND (event_id=6008 OR process_name="oas.exe") AND (keywords="crash" OR "restart")