Softing Secure Integration Server
Multiple vulnerabilities in Softing products allow remote code execution and denial of service. Affected products include Secure Integration Server (≤1.22), edgeAggregator (3.1), edgeConnector (3.1), OPC Suite (5.2), OPC UA C++ Server SDK (6), and uaGate (1.74). The vulnerabilities stem from improper input validation (CWE-125), insecure component loading (CWE-427), insufficient authentication (CWE-287), path traversal (CWE-23), unencrypted transmission (CWE-319), null pointer dereference (CWE-476), and integer underflow (CWE-191). An unauthenticated attacker can send specially crafted network requests to trigger arbitrary code execution or service crashes.
- Network-layer access to the affected Softing product
- Knowledge of the product's IP address and port (typically 9000)
- Default credentials if admin password has not been changed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2f8e6516-03ec-4868-99b6-8b50844fd5e7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.