First published: Wed Nov 10 2021(Updated: )
An issue was discovered in Softing Industrial Automation OPC UA C++ SDK before 5.66, and uaToolkit Embedded before 1.40. Remote attackers to cause a denial of service (DoS) by sending crafted messages to a client or server. The server process may crash unexpectedly because of a double free, and must be restarted.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Softing Datafeed Opc Suite | <5.18 | |
Softing edgeConnector | <=2.31 | |
Softing OPC | <5.66 | |
Softing Secure Integration Server | <=1.22 | |
Softing TH SCOPE | >=3.5 | |
Softing Uagates | <1.73 | |
Softing uaToolkit Embedded | <1.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40873 is a vulnerability in Softing Industrial Automation OPC UA C++ SDK before 5.66 and uaToolkit Embedded before 1.40, which allows remote attackers to cause a denial of service (DoS) by sending crafted messages to a client or server.
CVE-2021-40873 has a severity score of 7.5 (high).
The following software are affected by CVE-2021-40873: Softing Datafeed Opc Suite (up to version 5.18), Softing Edgeconnector (up to version 2.31), Softing OPC (up to version 5.66), Softing Secure Integration Server (up to version 1.22), Softing Th Scope (from version 3.5), Softing Uagates (up to version 1.73), and Softing uaToolkit Embedded (up to version 1.40).
CVE-2021-40873 can be exploited by sending crafted messages to a client or server, which can cause a denial of service (DoS) by crashing the server process due to a double free.
Yes, Softing Industrial Automation has released a fix for CVE-2021-40873. It is recommended to update to the latest version of the affected software to mitigate the vulnerability.