First published: Wed Nov 10 2021(Updated: )
An issue was discovered in Softing Industrial Automation OPC UA C++ SDK before 5.66. Remote attackers to cause a denial of service (DoS) by sending crafted messages to a OPC/UA client. The client process may crash unexpectedly because of a wrong type cast, and must be restarted.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Softing Datafeed Opc Suite | <5.18 | |
Softing OPC | <5.66 | |
Softing Secure Integration Server | <=1.22 | |
Softing TH SCOPE | >=3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40871 is a vulnerability discovered in Softing Industrial Automation OPC UA C++ SDK before version 5.66.
CVE-2021-40871 has a severity rating of 7.5, which is considered high.
Softing Datafeed OPC Suite versions up to 5.18 are affected by CVE-2021-40871.
Softing OPC versions up to 5.66 are affected by CVE-2021-40871.
Softing Secure Integration Server versions up to 1.22, inclusive, are affected by CVE-2021-40871.
Softing Th Scope versions from 3.5 and above are affected by CVE-2021-40871.
A remote attacker can exploit CVE-2021-40871 by sending crafted messages to an OPC/UA client, causing a denial of service (DoS) and crashing the client process.
To fix CVE-2021-40871, update Softing Industrial Automation OPC UA C++ SDK to version 5.66 or later.
For additional information about CVE-2021-40871, refer to the Softing Industrial Automation website and the Security Bulletin provided.