First published: Mon Apr 04 2022(Updated: )
Softing OPC UA C++ SDK (Software Development Kit) versions from 5.59 to 5.64 exported library functions don't properly validate received extension objects, which may allow an attacker to crash the software by sending a variety of specially crafted packets to access several unexpected memory locations.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Softing Opc Ua C\+\+ Software Development Kit | >=5.59.0<5.65.0 | |
Softing OPC UA C++ SDK (Software Development Kit) versions from 5.59 to 5.64 |
Softing has released version 5.65 to address this vulnerability and has notified known users of the release. As this vulnerability only affects the publisher and subscriber protocol, Softing highly recommends customers using this protocol to upgrade to the latest version or disable the functionality. Please download the latest software package from the Softing website.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Softing OPC UA C++ SDK vulnerability is CVE-2021-32994.
The severity of CVE-2021-32994 is high with a score of 7.5.
CVE-2021-32994 is a vulnerability in Softing OPC UA C++ SDK that may allow an attacker to crash the software by sending specially crafted packets to access unexpected memory locations.
Softing OPC UA C++ SDK versions from 5.59 to 5.64 are affected by CVE-2021-32994.
Yes, a fix is available for CVE-2021-32994. It is recommended to update to version 5.65.0 or higher of Softing OPC UA C++ SDK.