OPC UA User Authentication Token Exploit
20.06.2018
OPC Foundation (OPCF) announced a new Security Bulletin (CVE-2018-7559) on April 12, 2018 concerning a potential security exploit in OPC UA servers:
“The vulnerability can allow a remote attacker to determine a Server’s private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack.”
Although the original issue was announced for .NET stack applications only, we discovered that it also affects the applications built with Prosys OPC UA Java SDK. Since this part of user authentication tokens are only handled on the SDK level, it does not concern the OPCF Java Stack.
Prosys OPC UA products affected
The vulnerability affects directly:
- All applications built with Prosys OPC UA Java SDK 3.1.2 and earlier
- Prosys OPC UA Simulation Server 3.0.0 and earlier
- Prosys OPC UA Modbus Server 1.2.2 and earlier
Fixed products
The issue is fixed in the Prosys OPC UA Java SDK 3.1.4, Simulation Server 3.1.4 and Modbus Server 1.2.4 and we encourage everyone to update to these versions.
Unified Automation products affected
Unified Automation has released there own bulletin regarding the issue and how it affects their products.
Avoiding the issue in existing products
The issue can also be avoided by disabling the Security Policy Basic128Rsa15 in the server applications. So, if you are not able to update or you have known applications that enable user name authentication running at customer sites, we advice you to disable Basic128Rsa15 from those applications.
Basic128Rsa15 and Basic256 are deprecated from OPC UA 1.04, and we recommend using the Basic256Sha256 policy for older applications. OPC UA 1.04 defines new security policies, Aes128-Sha256-RsaOaep and Aes-256-Sha256-RsaPss, which replace the older policies. We are working on providing support for these policies in a future SDK version, which will be based on OPC UA 1.04.
More security information
You will find the currently announced security issues in Prosys OPC products from the blog under the #security tag.
You might also like to read about the OPC UA Security Process of the OPC Foundation.
Jouni Aro
Chief Technology Officer
Email: jouni.aro@prosysopc.com
Expertise and responsibility areas: OPC & OPC UA product development, project work and customer support
About Prosys OPC Ltd
Prosys OPC is a leading provider of professional OPC software and services with over 20 years of experience in the field. OPC and OPC UA (Unified Architecture) are communications standards used especially by industrial and high-tech companies.
Newest blog posts
Why Do Standards Matter in Smart Manufacturing?
The blog post discusses the importance of standards in smart manufacturing, envisioning a future where auto-configurable systems in manufacturing rely on standardized data formats for seamless integration and reduced costs, with a focus on the OPC UA standard family as a key enabler.
OPC UA PubSub to Cloud via MQTT
Detailed overview of the demo presented at the OPC Foundation booth
SimServer How To #3: Simulate data changes on a server using an OPC UA client
A two-part step-by-step tutorial on how to write data changes on an OPC UA server using an OPC UA client.