OPC UA Buffer Overflow Exploit

OPC Foundation (OPCF) has announced a Security Bulletin (CVE-2018-12086) on September 12, 2018 concerning a vulnerability in the OPC UA Java Stack of OPC Foundation:

"Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests."

Prosys OPC UA products affected

The vulnerability affects directly:

  • All applications built with Prosys OPC UA Java SDK 3.1.2 and earlier
  • Prosys OPC UA Client 3.0.0 and earlier
  • Prosys OPC UA Simulation Server 3.0.0 and earlier
  • Prosys OPC UA Modbus Server 1.2.2 and earlier
  • Prosys OPC UA Historian 1.0.0

Fixed products

The issue has been fixed in Prosys OPC UA Java SDK 3.1.4, UA Client 3.1.4, Simulation Server 3.1.4 and Modbus Server 1.2.4 and we encourage everyone to update to these versions. Prosys OPC UA Historian will be updated later, respectively.

Unified Automation products affected

Unified Automation has released a public security bulletin regarding the issue.

More security information

You will find the currently announced security issues in Prosys OPC products from the blog under the Security tag.

You might also like to read about the OPC UA Security Process of the OPC Foundation.

Headshot of Jouni Aro

Jouni Aro

Chief Technology Officer

Email: jouni.aro@prosysopc.com

Related Posts

Interested in this topic?

Get updated about new posts through our newsletter!
Scroll to Top