First published: Thu May 04 2023(Updated: )
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
OPC Foundation Unified Architecture .NET Standard |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-23-548 is classified as a denial-of-service vulnerability that can be exploited without authentication.
To remediate ZDI-23-548, it is recommended to update the OPC Foundation UA .NET Standard software to the latest version provided by the vendor.
ZDI-23-548 allows remote attackers to create a denial-of-service condition, disrupting the service of the affected installations.
Currently, there are no official workarounds for mitigating the impact of ZDI-23-548 other than applying the software update.
The vulnerability ZDI-23-548 affects installations of OPC Foundation UA .NET Standard.