CVE-2023-34348

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to remotely crash the PI Message Subsystem in AVEVA PI Server, causing denial-of-service. It affects industrial control systems using vulnerable versions of AVEVA PI Server, potentially disrupting data collection and monitoring in critical infrastructure environments.

💻 Affected Systems

Products:
  • AVEVA PI Server
Versions: 2023 and 2018 SP3 P05 and prior
Operating Systems: Windows Server (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects PI Message Subsystem component specifically; PI Server installations in industrial control environments are typically vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of PI Server message processing, halting industrial data collection and monitoring across an entire facility, potentially affecting safety systems and operational visibility.

🟠

Likely Case

Temporary denial-of-service affecting PI Message Subsystem functionality, disrupting real-time data flow between industrial devices and monitoring systems until service is restored.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthenticated access to vulnerable services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA advisory indicates unauthenticated remote exploitation is possible; exploit details not publicly disclosed but vulnerability is relatively straightforward to trigger.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply updates beyond 2023 and 2018 SP3 P05 versions

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-018-01

Restart Required: Yes

Instructions:

1. Download latest PI Server updates from AVEVA support portal. 2. Backup current configuration and data. 3. Apply patches following vendor documentation. 4. Restart PI Server services. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to PI Server to only trusted internal networks and required clients

Configure firewall rules to block external/untrusted access to PI Server ports (typically 5450, 5451)

Service Hardening

windows

Run PI Server with minimal privileges and implement additional authentication layers

Configure Windows service to run under limited account
Implement network-level authentication if supported

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PI Server from untrusted networks
  • Deploy intrusion detection/prevention systems to monitor for DoS attempts against PI Server services

🔍 How to Verify

Check if Vulnerable:

Check PI Server version in PI System Management Tools or registry: HKEY_LOCAL_MACHINE\SOFTWARE\PISystem\PI-AF\Server\Version

Check Version:

reg query "HKLM\SOFTWARE\PISystem\PI-AF\Server" /v Version

Verify Fix Applied:

Verify PI Server version is updated beyond vulnerable versions and test PI Message Subsystem functionality

📡 Detection & Monitoring

Log Indicators:

  • PI Server service crashes
  • PI Message Subsystem errors in Windows Event Logs
  • Unusual connection attempts to PI Server ports

Network Indicators:

  • Multiple connection attempts to PI Server ports (5450/5451) from unauthenticated sources
  • Abnormal traffic patterns to PI Server

SIEM Query:

source="PI_Server_Logs" AND (event_id="7034" OR message="crash" OR message="denial")

🔗 References

📤 Share & Export