Unified Automation UaGateway OPC UA Server Use-After-Free Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation UaGateway. Authentication is required to exploit this vulnerability.
The specific flaw exists within the implementation of the ImportXML function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20497.
References
Link | Resource |
---|---|
https://documentation.unified-automation.com/uagateway/1.5.14/CHANGELOG.txt | Release Notes |
https://www.zerodayinitiative.com/advisories/ZDI-23-777/ | Third Party Advisory |
https://documentation.unified-automation.com/uagateway/1.5.14/CHANGELOG.txt | Release Notes |
https://www.zerodayinitiative.com/advisories/ZDI-23-777/ | Third Party Advisory |
Configurations
History
08 Aug 2025, 14:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:unified-automation:uagateway:*:*:*:*:*:*:*:* | |
References | () https://documentation.unified-automation.com/uagateway/1.5.14/CHANGELOG.txt - Release Notes | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-777/ - Third Party Advisory | |
First Time |
Unified-automation uagateway
Unified-automation |
21 Nov 2024, 08:02
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://documentation.unified-automation.com/uagateway/1.5.14/CHANGELOG.txt - | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-777/ - |
03 May 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-03 02:15
Updated : 2025-08-08 14:17
NVD link : CVE-2023-32172
Mitre link : CVE-2023-32172
CVE.ORG link : CVE-2023-32172
JSON object : View
Products Affected
unified-automation
- uagateway
CWE
CWE-416
Use After Free