This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application.
Affected Software | Affected Version | How to fix |
---|---|---|
OPC Foundation Unified Architecture .NET Standard |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-536 is considered high due to its potential to cause denial-of-service conditions.
To fix ZDI-20-536, ensure that you apply the latest patches provided by OPC Foundation for the UA .NET Standard software.
ZDI-20-536 affects installations of OPC Foundation UA .NET Standard software.
ZDI-20-536 can lead to a denial-of-service condition, disrupting the availability of affected systems.
No, authentication is not required to exploit the vulnerability identified in ZDI-20-536.