In Softing OPC UA C++ SDK before 6.10, a user with low privilege could exploit this issue to execute arbitrary code on the affected device or cause denial of service. An attacker must be aware of the buffer size as it is hard coded and not configurable.

The latest release of Softing OPC UA C++ SDK before 6.10 fixes this issue.

An issue was discovered in the Softing OPC UA C++ SDK before 6.10. An attacker could exploit this issue to cause denial of service.

The latest release of Softing OPC UA C++ SDK before 6.10 fixes this issue.

An issue was discovered in Softing OPC UA C++ SDK before 6.10. An attacker could exploit this issue to cause denial of service.

The latest release of Softing OPC UA C++ SDK before 6.10 fixes this issue.

An issue was discovered in Softing OPC UA C++ SDK before 6.10. An attacker could exploit this issue to cause denial of service.

The latest release of Softing OPC UA C++ SDK before 6.10 fixes this issue.

Installation of Softing OPC UA C++ SDK Before 6.10

The latest release of Softing OPC UA C++ SDK before 6.10 installs the vulnerable version by default.

A user with low privilege could exploit this issue to execute arbitrary code on the affected device or cause denial of service.

Timeline

Published on: 10/20/2022 21:15:00 UTC
Last modified on: 10/25/2022 19:35:00 UTC

References