CVE-2023-31048
https://notcve.org/view.php?id=CVE-2023-31048
The OPC UA .NET Standard Reference Server before 1.4.371.86. places sensitive information into an error message that may be seen remotely. El servidor de referencia estándar OPC UA .NET anterior a 1.4.371.86. coloca información confidencial en un mensaje de error que puede verse de forma remota. • https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf https://github.com/OPCFoundation/UA-.NETStandard/releases https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.371.86 • CWE-209: Generation of Error Message Containing Sensitive Information •
CVE-2020-29457
https://notcve.org/view.php?id=CVE-2020-29457
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 could allow a rogue application to establish a secure connection. Una vulnerabilidad de Elevación de Privilegios en OPC UA .NET Standard Stack versión 1.4.363.107 podría permitir a una aplicación fraudulenta establecer una conexión segura. • https://github.com/OPCFoundation/UA-.NETStandard https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua • CWE-295: Improper Certificate Validation •
CVE-2019-19135
https://notcve.org/view.php?id=CVE-2019-19135
In OPC Foundation OPC UA .NET Standard codebase 1.4.357.28, servers do not create sufficiently random numbers in OPCFoundation.NetStandard.Opc.Ua before 1.4.359.31, which allows man in the middle attackers to reuse encrypted user credentials sent over the network. En las bases del código OPC Foundation OPC UA .NET Standard versiones 1.4.357.28, los servidores no crean suficientemente números aleatorios en OPCFoundation.NetStandard.Opc.Ua versiones anteriores a 1.4.359.31, lo que permite a atacantes de tipo man in the middle reutilizar las credenciales de usuario cifradas enviadas a través de la red. • https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf https://opcfoundation.org/security-bulletins • CWE-330: Use of Insufficiently Random Values •
CVE-2018-12087
https://notcve.org/view.php?id=CVE-2018-12087
Failure to validate certificates in OPC Foundation UA Client Applications communicating without security allows attackers with control over a piece of network infrastructure to decrypt passwords. El error a la hora de validar certificados en OPC Foundation UA Client Applications que se comunican sin seguridad permite que los atacantes con control sobre una parte de la infraestructura de red descifren contraseñas. • https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12087.pdf • CWE-295: Improper Certificate Validation •
CVE-2018-7559
https://notcve.org/view.php?id=CVE-2018-7559
An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack. Se ha descubierto un problema en OPC UA .NET Standard Stack and Sample Code antes del commit de GitHub del 2018-04-12, así como OPC UA .NET Legacy Stack and Sample Code antes del commit de GitHub del 2018-03-13. Una vulnerabilidad en las aplicaciones de OPC UA puede permitir que un atacante remoto determine la clave privada de un servidor mediante el envío de UserIdentityTokens malos cuidadosamente construidos como parte de un ataque de oráculo. • http://www.securityfocus.com/bid/108688 https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45 https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150 https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-7559.pdf • CWE-320: Key Management Errors •