CVE-2022-25888: Uncontrolled Resource Consumption in opcua
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.65208%
CWE
Published
8/24/2022
Updated
1/28/2023
KEV Status
No
Technology
Rust
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| opcua | rust | < 0.11.0 | 0.11.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing resource limits in three key areas: 1) MessageChunk decoding lacked max_message_size checks (CWE-770), 2) TCP transport layer didn't properly enforce max_chunk_count per session (CWE-400), and 3) MessageWriter allowed unlimited chunk generation. The GitHub commit 6fb683c specifically adds these validations in these components, confirming they were previously missing. The functions directly handle message/chunk processing without the critical limits described in the CVE, making them root causes of the resource exhaustion vulnerability.