Softing OPC-UA C++ SDK
A remote attacker can crash applications using the Softing OPC UA C++ SDK (versions 5.59 to 5.64) by sending a specially crafted message to the publisher or subscriber protocol implementation, resulting in denial of service. The vulnerability exists in exported library functions; the impact depends on how the library is integrated into the application. Softing has released version 5.65 to address this issue and recommends customers using the publisher/subscriber protocol upgrade or disable the affected functionality.
- Network access to the OPC UA port (typically 4840)
- The device or application must be using OPC UA publisher or subscriber protocol functions from the vulnerable SDK versions
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7092c7c2-434b-4647-be58-a1c9126f9983Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.