First published: Thu Oct 20 2022(Updated: )
An issue was discovered in Softing OPC UA C++ SDK before 6.10. A buffer overflow or an excess allocation happens due to unchecked array and matrix bounds in structure data types.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Softing edgeAggregator | <=3.50 | |
Softing edgeConnector | <=3.50 | |
Softing OPC | <=5.22 | |
Softing Opc Ua C\+\+ Software Development Kit | <=6.00 | |
Softing Secure Integration Server | <=1.22 | |
Softing Uagates | <=1.74 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37453 is a vulnerability discovered in Softing OPC UA C++ SDK before version 6.10, which allows for a buffer overflow or an excess allocation due to unchecked array and matrix bounds in structure data types.
The following Softing software versions are affected: Softing Edgeaggregator up to version 3.50, Softing Edgeconnector up to version 3.50, Softing OPC up to version 5.22, Softing Opc Ua C++ Software Development Kit up to version 6.00, Softing Secure Integration Server up to version 1.22, and Softing Uagates up to version 1.74.
CVE-2022-37453 has a severity rating of 7.5 (High).
To fix CVE-2022-37453, users should upgrade to Softing OPC UA C++ SDK version 6.10 or later.
Yes, you can find more information about CVE-2022-37453 at the official Softing PSIRT Advisory at https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-9.html and the Softing website at https://softing.com.