First published: Mon Feb 10 2025(Updated: )
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-h958-fxgg-g7w3. This link is maintained to preserve external references. ## Original Description Vulnerability in the OPC UA .NET Standard Stack before 1.5.374.158 allows an unauthorized attacker to bypass application authentication when the deprecated Basic128Rsa15 security policy is enabled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
nuget/OPCFoundation.NetStandard.Opc.Ua | <1.5.374.158 | 1.5.374.158 |
OPC Foundation .NET Standard OPC UA | <1.5.374.158 | |
nuget/OPCFoundation.NetStandard.Opc.Ua.Core | <1.5.374.158 | 1.5.374.158 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42512 is classified as a high severity vulnerability that allows unauthorized access under certain conditions.
To fix CVE-2024-42512, upgrade to the version 1.5.374.158 or later of the OPC UA .NET Standard Stack.
The impact of CVE-2024-42512 is that attackers can bypass application authentication when the Basic128Rsa15 security policy is enabled.
Versions of OPC Foundation OPC UA .NET Standard Stack prior to 1.5.374.158 are vulnerable to CVE-2024-42512.
Using the Basic128Rsa15 security policy is not safe with CVE-2024-42512 as it can allow attackers to bypass authentication.