This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1667 | This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295. |
Github GHSA |
GHSA-9q94-v7ch-mxqw | Insufficient Session Expiration and TOCTOU Race Condition in OPC FOundation UA .Net Standard |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-04T10:12:11.060Z
Reserved: 2020-02-11T00:00:00
Link: CVE-2020-8867
No data.
Status : Modified
Published: 2020-04-22T21:15:14.090
Modified: 2024-11-21T05:39:36.053
Link: CVE-2020-8867
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA