First published: Fri May 05 2023(Updated: )
The OPC UA .NET Standard Reference Server before 1.4.371.86. places sensitive information into an error message that may be seen remotely.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/OPCFoundation.NetStandard.Opc.Ua.Server | <1.4.371.86 | 1.4.371.86 |
nuget/OPCFoundation.NetStandard.Opc.Ua.Core | <1.4.371.86 | 1.4.371.86 |
OPC Foundation .NET Standard OPC UA | <1.4.371.86 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31048 is classified as a Medium severity vulnerability.
To fix CVE-2023-31048, upgrade to OPC Foundation .NET Standard Reference Server version 1.4.371.86 or later.
CVE-2023-31048 exposes sensitive information contained within error messages that can be viewed by remote attackers.
CVE-2023-31048 affects all versions of the OPC UA .NET Standard Reference Server prior to 1.4.371.86.
Attackers can send malicious requests that may cause the server to leak sensitive information through error messages.