CVE-2023-39477

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to cause denial-of-service by sending excessive OPC UA ConditionRefresh requests to Inductive Automation Ignition servers, consuming all available resources. All affected Ignition installations are vulnerable without authentication.

💻 Affected Systems

Products:
  • Inductive Automation Ignition
Versions: Versions prior to 8.1.33
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability with resource exhaustion causing service disruption to all connected industrial control systems and clients.

🟠

Likely Case

Service degradation or temporary outage affecting industrial operations until system restart.

🟢

If Mitigated

Minimal impact with proper network segmentation and rate limiting in place.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing systems particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers can still exploit, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple resource exhaustion attack requiring only network access to OPC UA port.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.1.33

Vendor Advisory: https://inductiveautomation.com/downloads/releasenotes/8.1.33

Restart Required: Yes

Instructions:

1. Download Ignition 8.1.33 from vendor portal. 2. Backup current installation. 3. Run installer to upgrade. 4. Restart Ignition services.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to Ignition OPC UA ports (typically 49320) to trusted networks only.

Rate Limiting

all

Implement network-level rate limiting for OPC UA traffic to prevent request flooding.

🧯 If You Can't Patch

  • Implement strict network access controls to limit OPC UA port exposure
  • Deploy intrusion prevention systems with DoS protection rules

🔍 How to Verify

Check if Vulnerable:

Check Ignition version in Gateway Web Interface under Status > About. If version is below 8.1.33, system is vulnerable.

Check Version:

Check Gateway Web Interface at http://[ignition-server]:8088/main/system/about

Verify Fix Applied:

Confirm version shows 8.1.33 or higher in Gateway Web Interface and test OPC UA connectivity remains functional.

📡 Detection & Monitoring

Log Indicators:

  • High frequency of OPC UA ConditionRefresh requests
  • Resource exhaustion warnings in system logs
  • Unusual spike in CPU/memory usage

Network Indicators:

  • Excessive traffic to OPC UA port 49320
  • Multiple rapid ConditionRefresh requests from single source

SIEM Query:

source="ignition.log" AND "ConditionRefresh" | stats count by src_ip | where count > 100

🔗 References

📤 Share & Export