Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Opcfoundation Subscribe
Total 21 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-44725 1 Opcfoundation 1 Local Discovery Server 2022-11-22 N/A 7.8 HIGH
OPC Foundation Local Discovery Server (LDS) through 1.04.403.478 uses a hard-coded file path to a configuration file. This allows a normal user to create a malicious file that is loaded by LDS (running as a high-privilege user).
CVE-2021-45117 2 Opcfoundation, Siemens 4 Ua-nodeset, Simatic Net Pc, Sitop Manager and 1 more 2022-09-02 4.3 MEDIUM 6.5 MEDIUM
The OPC autogenerated ANSI C stack stubs (in the NodeSets) do not handle all error cases. This can lead to a NULL pointer dereference.
CVE-2021-40142 2 Opcfoundation, Siemens 8 Local Discover Server, Simatic Net Pc, Simatic Process Historian Opc Ua Server and 5 more 2022-09-02 5.0 MEDIUM 7.5 HIGH
In OPC Foundation Local Discovery Server (LDS) before 1.04.402.463, remote attackers can cause a denial of service (DoS) by sending carefully crafted messages that lead to Access of a Memory Location After the End of a Buffer.
CVE-2022-33916 1 Opcfoundation 1 Ua .net Standard Stack 2022-08-25 N/A 7.5 HIGH
OPC UA .NET Standard Reference Server 1.04.368 allows a remote attacker to cause the application to access sensitive information.
CVE-2022-29866 1 Opcfoundation 1 Ua .net Standard Stack 2022-06-27 5.0 MEDIUM 7.5 HIGH
OPC UA .NET Standard Stack 1.04.368 allows a remote attacker to exhaust the memory resources of a server via a crafted request that triggers Uncontrolled Resource Consumption.
CVE-2022-29863 1 Opcfoundation 1 Ua .net Standard Stack 2022-06-27 5.0 MEDIUM 7.5 HIGH
OPC UA .NET Standard Stack 1.04.368 allows remote attacker to cause a crash via a crafted message that triggers excessive memory allocation.
CVE-2022-29864 1 Opcfoundation 1 Ua .net Standard Stack 2022-06-27 5.0 MEDIUM 7.5 HIGH
OPC UA .NET Standard Stack 1.04.368 allows a remote attacker to cause a server to crash via a large number of messages that trigger Uncontrolled Resource Consumption.
CVE-2022-29865 1 Opcfoundation 1 Ua .net Standard Stack 2022-06-27 5.0 MEDIUM 7.5 HIGH
OPC UA .NET Standard Stack allows a remote attacker to bypass the application authentication check via crafted fake credentials.
CVE-2022-29862 1 Opcfoundation 1 Ua .net Standard Stack 2022-06-27 5.0 MEDIUM 7.5 HIGH
An infinite loop in OPC UA .NET Standard Stack 1.04.368 allows a remote attackers to cause the application to hang via a crafted message.
CVE-2022-30551 1 Opcfoundation 1 Ua-java 2022-06-01 5.0 MEDIUM 7.5 HIGH
OPC UA Legacy Java Stack 2022-04-01 allows a remote attacker to cause a server to stop processing messages by sending crafted messages that exhaust available resources.
CVE-2019-19135 1 Opcfoundation 2 Netstandard.opc.ua, Ua-.netstandard 2021-07-21 5.8 MEDIUM 7.4 HIGH
In OPC Foundation OPC UA .NET Standard codebase 1.4.357.28, servers do not create sufficiently random numbers in OPCFoundation.NetStandard.Opc.Ua before 1.4.359.31, which allows man in the middle attackers to reuse encrypted user credentials sent over the network.
CVE-2021-27432 1 Opcfoundation 2 Ua-.net-legacy, Ua .net Standard Stack 2021-06-01 5.0 MEDIUM 7.5 HIGH
OPC Foundation UA .NET Standard versions prior to 1.4.365.48 and OPC UA .NET Legacy are vulnerable to an uncontrolled recursion, which may allow an attacker to trigger a stack overflow.
CVE-2020-29457 1 Opcfoundation 1 Ua-.netstandard 2021-03-26 2.1 LOW 4.4 MEDIUM
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 could allow a rogue application to establish a secure connection.
CVE-2018-12086 2 Debian, Opcfoundation 5 Debian Linux, Unified Architecture-.net-legacy, Unified Architecture-java and 2 more 2020-08-24 5.0 MEDIUM 7.5 HIGH
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
CVE-2020-8867 1 Opcfoundation 1 Unified Architecture .net-standard 2020-04-29 5.0 MEDIUM 7.5 HIGH
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.
CVE-2018-7559 1 Opcfoundation 2 Ua-.net-legacy, Ua-.netstandard 2019-06-10 3.5 LOW 5.3 MEDIUM
An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack.
CVE-2018-12087 1 Opcfoundation 2 Ua-.net-legacy, Ua-.netstandard 2019-01-14 2.1 LOW 5.3 MEDIUM
Failure to validate certificates in OPC Foundation UA Client Applications communicating without security allows attackers with control over a piece of network infrastructure to decrypt passwords.
CVE-2018-12585 1 Opcfoundation 2 Ua-.net-legacy, Ua-java 2018-11-27 6.4 MEDIUM 8.2 HIGH
An XXE vulnerability in the OPC UA Java and .NET Legacy Stack can allow remote attackers to trigger a denial of service.
CVE-2017-17443 1 Opcfoundation 1 Local Discovery Server 2018-08-08 4.0 MEDIUM 6.5 MEDIUM
OPC Foundation Local Discovery Server (LDS) 1.03.370 required a security update to resolve multiple vulnerabilities that allow attackers to trigger a crash by placing invalid data into the configuration file. This vulnerability requires an attacker with access to the file system where the configuration file is stored; however, if the configuration file is altered the LDS will be unavailable until it is repaired.
CVE-2017-12070 1 Opcfoundation 1 Ua-.net-legacy 2018-08-07 6.8 MEDIUM 8.8 HIGH
Unsigned versions of the DLLs distributed by the OPC Foundation may be replaced with malicious code.