This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of certificates. A crafted certificate can force the server into an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Unified Automation OPC UA C++ Demo Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-1029 is classified as critical due to the potential for remote denial-of-service attacks.
To fix ZDI-22-1029, update to the latest version of Unified Automation OPC UA C++ Demo Server as provided in their security advisories.
ZDI-22-1029 can be exploited to perform remote denial-of-service attacks against affected installations.
No, authentication is not required to exploit the ZDI-22-1029 vulnerability.
The affected software for ZDI-22-1029 is Unified Automation OPC UA C++ Demo Server.