Softing OPC UA C++ SDK (Software Development Kit) versions from 5.59 to 5.64 exported library functions don't properly validate received extension objects, which may allow an attacker to crash the software by sending a variety of specially crafted packets to access several unexpected memory locations.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-19715 Softing OPC UA C++ SDK (Software Development Kit) versions from 5.59 to 5.64 exported library functions don't properly validate received extension objects, which may allow an attacker to crash the software by sending a variety of specially crafted packets to access several unexpected memory locations.
Fixes

Solution

Softing has released version 5.65 to address this vulnerability and has notified known users of the release. As this vulnerability only affects the publisher and subscriber protocol, Softing highly recommends customers using this protocol to upgrade to the latest version or disable the functionality. Please download the latest software package from the Softing website.


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:31:19.514Z

Reserved: 2021-05-13T00:00:00.000Z

Link: CVE-2021-32994

cve-icon Vulnrichment

Updated: 2024-08-03T23:42:18.878Z

cve-icon NVD

Status : Modified

Published: 2022-04-04T20:15:09.260

Modified: 2024-11-21T06:08:05.220

Link: CVE-2021-32994

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.