First published: Wed Apr 22 2020(Updated: )
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Opcfoundation Unified Architecture .net-standard | <=1.04.358.30 | |
OPC Foundation UA .NET Standard |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8867 is a vulnerability in OPC Foundation UA .NET Standard 1.04.358.30 that allows remote attackers to create a denial-of-service condition.
CVE-2020-8867 has a severity rating of 7.5 (high).
CVE-2020-8867 affects OPC Foundation UA .NET Standard 1.04.358.30 installations.
No, authentication is not required to exploit CVE-2020-8867.
Yes, you can find more information about CVE-2020-8867 in the OPC Foundation Security Bulletin and the Zero Day Initiative advisory.