CVE-2022-24298

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to crash the freeopcua service by overwhelming it with too many CloseSession requests that consume excessive memory. The attacker needs to send these requests with a specific parameter set to False, which can lead to a Denial of Service for legitimate users.

Technical Description

All versions of package freeopcua/freeopcua are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactNone
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade FPatched in 1288 days

Quick Information

Published

Aug 23, 2022

over 3 years ago

Last Modified

Mar 3, 2026

about 1 month ago

Vendor

freeopcua

Product

freeopcua