CVE-2023-27334

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to cause a denial-of-service condition in Softing edgeConnector Siemens by sending excessive OPC UA ConditionRefresh requests, which exhausts server resources. It affects installations of Softing edgeConnector Siemens without requiring authentication.

💻 Affected Systems

Products:
  • Softing edgeConnector Siemens
Versions: Versions prior to the patched version (specific version not provided in references)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations that expose the OPC UA interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to resource exhaustion, disrupting industrial operations and potentially causing safety or production issues.

🟠

Likely Case

Service degradation or temporary unavailability of the OPC UA server functionality, impacting data collection and control systems.

🟢

If Mitigated

Minimal impact with proper network segmentation and rate limiting in place.

🌐 Internet-Facing: HIGH - No authentication required and remote exploitation possible.
🏢 Internal Only: MEDIUM - Still exploitable from internal networks but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple resource exhaustion attack requiring only network access to the OPC UA port.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://industrial.softing.com/fileadmin/psirt/downloads/syt-2023-1.html

Restart Required: Yes

Instructions:

1. Download the latest version from Softing's website
2. Follow vendor's upgrade instructions
3. Restart the edgeConnector service

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to the OPC UA port (typically 4840/tcp) to trusted networks only.

Rate Limiting

all

Implement network-level rate limiting for OPC UA traffic to prevent request flooding.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the OPC UA interface
  • Deploy intrusion prevention systems with DoS protection rules

🔍 How to Verify

Check if Vulnerable:

Check edgeConnector Siemens version against vendor advisory. If running unpatched version and OPC UA interface is exposed, assume vulnerable.

Check Version:

Check version through edgeConnector management interface or installation directory

Verify Fix Applied:

Verify installation of patched version from vendor advisory and confirm OPC UA service is running normally under load testing.

📡 Detection & Monitoring

Log Indicators:

  • High frequency of OPC UA ConditionRefresh requests
  • Resource exhaustion warnings in system logs
  • Service restart events

Network Indicators:

  • Unusually high volume of traffic to OPC UA port (4840/tcp)
  • Multiple ConditionRefresh requests from single source

SIEM Query:

source_port=4840 AND (event_type="ConditionRefresh" OR protocol="OPC-UA") | stats count by src_ip | where count > threshold

🔗 References

📤 Share & Export