OPC UA is the standard unified communication protocol in industrial environments
Proprietary field devices and ICS/SCADA systems that previously could not exchange data on the OT network now do so over OPC UA, which is now supported by dozens of vendors across industries
Team82 has compiled a comprehensive guide to OPC UA, examining its history, security features, and attack surface
Part 1, OPC UA Uncovered: History of the OPC UA Protocol is available today
In the coming weeks, we will publish additional installations of this guide, including disclosures of new vulnerabilities, details on some of the tools we use—including an OPC UA network fuzzer, and an exploitation framework
OPC UA (Open Protocol Communication Unified Architecture) is today the standard protocol for unified communications in industrial environments. As more vendors build new products that implement OPC UA—or retrofit older devices to support the protocol—it becomes one of the few mutually understood and adopted technologies in OT.
OPC UA solved critical interoperability issues between field devices and ICS/SCADA systems that previously could not exchange data. Developed by the OPC Foundation, OPC UA is the standard protocol over which engineers and operators can, from a single server, communicate with and manage physical processes on the OT network. The fact that OPC UA is platform independent allows devices from different vendors to seamlessly communicate.
To achieve this goal, a few components were introduced: the OPC server, OPC client, and the OPC gateway. The OPC server contains many protocol converters that are capable of communicating with devices, such as PLCs, using their proprietary protocols, including Modbus, EtherNet/IP, S7, and more. The OPC server will constantly query devices for specific predefined memory values that are known as tags or points, and store them in a special database. Later, an OPC client, such as an HMI, can communicate with the server using the generic OPC protocol to get the values of these tags/points.
Team82 has invested considerable time and resources to research the security of the OPC UA protocol. Since 2020, we’ve disclosed more than two dozen vulnerabilities in OPC UA products, or in the protocol stack itself. We’ve researched clients, servers, and other software that supports OPC UA, and our work has helped improve the security of the overall network protocol stack. In addition, we also made freely available a network fuzzer used to find a number of zero-day vulnerabilities in OPC UA products in preparation for the Pwn2Own Miami competition in 2022 and 2023.
Today, we’re publishing the first in a multipart series of blogs that we hope will be the ultimate resource for OT engineers, asset operators, and asset owners intimately involved in OT network security, and specifically, OPC UA.
Throughout the series we plan to share our research into the OPC UA attack surface, and provide extensive background on the following:
The inner workings of the protocol
Recap OPC UA history
Explain OPC UA’s security features
Cover the OPC-UA attack surface
Disclose some information about new vulnerabilities
Describe new attack techniques targeting OPC UA
Introduce a new OPC UA exploit framework and fuzzers.
Our goal is to publish and maintain a useful OPC UA security guide, one that can be referenced often in order to minimize the risk to OT networks, and reduce the potential for damaging remote code execution or denial-of-service attacks.
In part one of Team82’s series examining the OPC protocol, we look at its history and the different flavors of OPC that have been developed throughout the past two decades. This blog sets the table for the remainder of this series, which will examine the OPC attack surface, security features in the protocol, and attack vectors.
Part 1: History of the OPC UA protocol
Part two begins our exploration of the OPC UA protocol, how it's used, its data model, and encoding. This is an extensive technical dive under the hood of the protocol, which is the standardized, secure, and reliable communication channel for exchanging data between devices, machines, and control systems, irrespective of the manufacturer or platform.
Part 2: What is OPC UA?
In part three, we cover not only OPC UA's structure, but four messaging types: HEL, OPN, MSG, and CLO, and demonstrated how they come into play while communicating over OPC UA and creating new sessions. Finally, OPC UA’s security features are dissected. Its features enable users to be fully authenticated, authorized, and sign and/or encrypt traffic if they so choose.
Part 3: Exploring the OPC UA Protocol
In this part, we describe the risk of changing values via OPC UA and the threat associated with exploiting OPC-UA components like servers or gateways. We also delve into the supply chain of OPC-UA components including core libraries, protocols stacks, SDKs and products that are built on top of it.
Part 4: Targeting Core OPC UA Components
In part five, we explain our research methodology, how we set up our research environment, utilized fuzzers, and dove into the specification to find bugs and vulnerabilities in common protocol implementations. We will also discuss our results including the vulnerabilities we found, and the open-source tools we developed to uncover those issues.
Part 5: Inside Team82's Research Methodology
The centerpiece tool of our research is an advanced OPC UA Exploit Framework we built and used to execute many unique attacks against OPC UA implementations. It’s been immensely useful in finding close to 50 vulnerabilities in products using the protocol from OPC-UA client to servers to protocol gateways. In part six, we make it publicly available on our GitHub repository, and invite fellow researchers and vendors to use this framework to test their code bases and the security of your respective products.
Part 6: A One-of-a-Kind OPC UA Exploit Framework
Denial of service (DoS) attacks on industrial networks utilizing OPC UA are particularly perilous due to their potential to disrupt critical operations. OPC UA-based systems play a vital role in industrial automation, and a DoS attack can overload network resources or flood communication channels, rendering the system unavailable. In part seven, we explore three attack concepts that could disrupt automation services over OPC UA.
Part 7: Practical Denial-of-Service Attacks
We showcase our approach to researching and exploiting OPC UA client applications, where we combined classic OPC UA and OT knowledge with run-of-the-mill web vulnerabilities to uncover zero days in both clients. During our Pwn2Own research journey, we managed to find similar vulnerable code patterns in both applications, exploiting the OPC UA client’s trust in the data it receives from the OPC UA server.
Part 8: Gaining Client-Side Remote Code Execution
We uncovered four new vulnerabilities during our research of the Softing Secure Integration Server, which we were able to chain along with a fifth vulnerability found by the Zero Day Initiative in order to achieve full remote code execution on the server. The vulnerabilities range from bypasses of security features and programming limitations meant to restrict access to the server, to others that allowed us to read and write arbitrary files on the server.
Part 9: Chaining Vulnerabilities to Exploit Softing OPC UA Integration Servers
In this final entry of the series, we briefly recap the results of our research and also share helpful tips for asset owners. We are confident that OPC UA implementations are much more secure and robust. Most of our research was focused on helping OPC UA developers and vendors improve their protocol stack implementations, but we would like to share some tips for asset owners as well.
CWE-547 USE OF HARD-CODED, SECURITY-RELEVANT CONSTANTS:
Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 are vulnerable to an attacker impersonating the web application service and mislead victim clients.
Optigo Networks recommends users to upgrade to the following:
CVSS v3: 7.5
CWE-288 AUTHENTICATION BYPASS USING AN ALTERNATE PATH OR CHANNEL:
Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain an exposed web management service that could allow an attacker to bypass authentication measures and gain controls over utilities within the products.
Optigo Networks recommends users to upgrade to the following:
CVSS v3: 9.8
CWE-547 USE OF HARD-CODED, SECURITY-RELEVANT CONSTANTS:
Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain a hard coded secret key. This could allow an attacker to generate valid JWT (JSON Web Token) sessions.
Optigo Networks recommends users to upgrade to the following:
CVSS v3: 7.5
CWE-912 HIDDEN FUNCTIONALITY:
The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device.
Per FDA recommendation, CISA recommends users remove any Contec CMS8000 devices from their networks.
If asset owners cannot remove the devices from their networks, users should block 202.114.4.0/24 from their networks, or block 202.114.4.119 and 202.114.4.120.
Please note that this device may be re-labeled and sold by resellers.
Read more here: Do the CONTEC CMS8000 Patient Monitors Contain a Chinese Backdoor? The Reality is More Complicated….
CVSS v3: 7.5
CWE-295 IMPROPER CERTIFICATE VALIDATION:
The affected product is vulnerable due to failure of the update mechanism to verify the update server's certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server's response and deliver a malicious update to the user.
Medixant recommends users download the v2025.1 or later version of their software.
CVSS v3: 5.7