CVE-2023-39477
📋 TL;DR
This vulnerability allows unauthenticated remote attackers to cause denial-of-service by sending excessive OPC UA ConditionRefresh requests to Inductive Automation Ignition servers, consuming all available resources. All affected Ignition installations are vulnerable without authentication.
💻 Affected Systems
- Inductive Automation Ignition
📦 What is this software?
Ignition by Inductiveautomation
⚠️ Risk & Real-World Impact
Worst Case
Complete system unavailability with resource exhaustion causing service disruption to all connected industrial control systems and clients.
Likely Case
Service degradation or temporary outage affecting industrial operations until system restart.
If Mitigated
Minimal impact with proper network segmentation and rate limiting in place.
🎯 Exploit Status
Simple resource exhaustion attack requiring only network access to OPC UA port.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.1.33
Vendor Advisory: https://inductiveautomation.com/downloads/releasenotes/8.1.33
Restart Required: Yes
Instructions:
1. Download Ignition 8.1.33 from vendor portal. 2. Backup current installation. 3. Run installer to upgrade. 4. Restart Ignition services.
🔧 Temporary Workarounds
Network Segmentation
allRestrict access to Ignition OPC UA ports (typically 49320) to trusted networks only.
Rate Limiting
allImplement network-level rate limiting for OPC UA traffic to prevent request flooding.
🧯 If You Can't Patch
- Implement strict network access controls to limit OPC UA port exposure
- Deploy intrusion prevention systems with DoS protection rules
🔍 How to Verify
Check if Vulnerable:
Check Ignition version in Gateway Web Interface under Status > About. If version is below 8.1.33, system is vulnerable.
Check Version:
Check Gateway Web Interface at http://[ignition-server]:8088/main/system/about
Verify Fix Applied:
Confirm version shows 8.1.33 or higher in Gateway Web Interface and test OPC UA connectivity remains functional.
📡 Detection & Monitoring
Log Indicators:
- High frequency of OPC UA ConditionRefresh requests
- Resource exhaustion warnings in system logs
- Unusual spike in CPU/memory usage
Network Indicators:
- Excessive traffic to OPC UA port 49320
- Multiple rapid ConditionRefresh requests from single source
SIEM Query:
source="ignition.log" AND "ConditionRefresh" | stats count by src_ip | where count > 100