Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. opcua
  4. ›
  5. CVE-2022-25888

CVE-2022-25888: Uncontrolled Resource Consumption in opcua

August 24, 2022 (updated August 30, 2022)

The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.

References

  • github.com/advisories/GHSA-8mx2-gqx9-rm7f
  • github.com/locka99/opcua
  • github.com/locka99/opcua/pull/216
  • github.com/locka99/opcua/pull/216/commits/6fb683c5fec46c6dd347824491c4d93a229da695
  • nvd.nist.gov/vuln/detail/CVE-2022-25888
  • security.snyk.io/vuln/SNYK-RUST-OPCUA-2988751

Code Behaviors & Features

Detect and mitigate CVE-2022-25888 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.11.0

Fixed versions

  • 0.11.0

Solution

Upgrade to version 0.11.0 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-400: Uncontrolled Resource Consumption
  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

cargo/opcua/CVE-2022-25888.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:16 +0000.