asyncua@0.9.14 vulnerabilities

Pure Python OPC-UA client and server library

Direct Vulnerabilities

Known vulnerabilities in the asyncua package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

Affected versions of this package are vulnerable to Loop with Unreachable Exit Condition ('Infinite Loop') such that an attacker can send a malformed packet and as a result, the server will enter into an infinite loop and consume excessive memory.

Note:

When the attack is performed, no other client is able to reach the server. For a device with limited resources, it can lead to a crash of the device.

How to fix Loop with Unreachable Exit Condition ('Infinite Loop')?

Upgrade asyncua to version 0.9.96 or higher.

[,0.9.96)
  • M
Improper Authentication

Affected versions of this package are vulnerable to Improper Authentication such that it is possible to access Address Space without encryption and authentication.

Note:

This issue is a result of missing checks for services that require an active session.

How to fix Improper Authentication?

Upgrade asyncua to version 0.9.96 or higher.

[,0.9.96)
  • H
Denial of Service (DoS)

Affected versions of this package are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions.

An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.

How to fix Denial of Service (DoS)?

Upgrade asyncua to version 0.9.96 or higher.

[,0.9.96)