{"id":"CVE-2023-26151","details":"Versions of the package asyncua before 0.9.96 are vulnerable to Denial of Service (DoS) such that an attacker can send a malformed packet and as a result, the server will enter into an infinite loop and consume excessive memory.","aliases":["GHSA-gfvq-mxw3-mfq3","PYSEC-2023-190"],"modified":"2026-04-10T04:58:22.216389Z","published":"2023-10-03T05:15:50.507Z","references":[{"type":"ADVISORY","url":"https://github.com/FreeOpcUa/opcua-asyncio/releases/tag/v0.9.96"},{"type":"REPORT","url":"https://github.com/FreeOpcUa/opcua-asyncio/issues/1013"},{"type":"FIX","url":"https://github.com/FreeOpcUa/opcua-asyncio/commit/f6603daa34a93a658f0e176cb0b9ee5a6643b262"},{"type":"FIX","url":"https://github.com/FreeOpcUa/opcua-asyncio/pull/1039"},{"type":"FIX","url":"https://security.snyk.io/vuln/SNYK-PYTHON-ASYNCUA-5673709"},{"type":"EVIDENCE","url":"https://gist.github.com/artfire52/1540b234350795e0ecb4d672608dbec8"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/freeopcua/opcua-asyncio","events":[{"introduced":"0"},{"fixed":"c55447d865a6f9b9505bc538f3c56cf3a1421c60"},{"fixed":"f6603daa34a93a658f0e176cb0b9ee5a6643b262"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.9.96"}]}}],"versions":["0.10","0.10.0","0.10.1","0.10.11","0.10.12","0.10.14","0.10.15","0.10.17","0.10.2","0.10.3","0.10.4","0.10.5","0.10.6","0.10.7","0.10.8","0.10.9","0.5.1","0.6.0","0.6.1","0.8.0","0.8.1","0.8.2","0.8.3","0.8.4","0.9.0","0.9.1","0.9.13","0.9.14","0.9.17","0.9.18","0.9.19","0.9.2","0.9.3","0.9.4","0.9.6","0.9.7","0.90.0","0.90.1","0.90.2","0.90.3","0.90.4","v0.9.10","v0.9.11","v0.9.12","v0.9.13","v0.9.8","v0.9.90","v0.9.91","v0.9.92","v0.9.93","v0.9.94","v0.9.95"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-26151.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}