OPC UA Buffer Overflow Exploit
“Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.”
Prosys OPC UA products affected
The vulnerability affects directly:
- All applications built with Prosys OPC UA Java SDK 3.1.2 and earlier
- Prosys OPC UA Client 3.0.0 and earlier
- Prosys OPC UA Simulation Server 3.0.0 and earlier
- Prosys OPC UA Modbus Server 1.2.2 and earlier
- Prosys OPC UA Historian 1.0.0
The issue has been fixed in Prosys OPC UA Java SDK 3.1.4, UA Client 3.1.4, Simulation Server 3.1.4 and Modbus Server 1.2.4 and we encourage everyone to update to these versions. Prosys OPC UA Historian will be updated later, respectively.
Unified Automation products affected
Unified Automation has released a public security bulletin regarding the issue.
More security information
You will find the currently announced security issues in Prosys OPC products from the blog under the #Security tag.
You might also like to read about the OPC UA Security Process of the OPC Foundation.
Chief Technology Officer
Expertise and responsibility areas: OPC & OPC UA product development, project work and customer support
About Prosys OPC Ltd
Prosys OPC is a leading provider of professional OPC software and services with over 20 years of experience in the field. OPC and OPC UA (Unified Architecture) are communications standards used especially by industrial and high-tech companies.
Newest blog posts
Prosys OPC UA SDK for Java allows publishing OPC UA data to Azure IoT Central using the MQTT protocol.
Three simple ways to secure your automation network
Exporting an existing infromation model from a Real-life Server with UaExpert and simulating it in Prosys OPC UA Simulation Server.