A buffer-management vulnerability in OPC Foundation OPCFoundation.NetStandard.Opc.Ua.Core before 1.05.374.54 could allow remote attackers to exhaust memory resources. It is triggered when the system receives an excessive number of messages from a remote source. This could potentially lead to a denial of service (DoS) condition, disrupting the normal operation of the system.

Project Subscriptions

Vendors Products
Opcfoundation Subscribe
Ua-.netstandard Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-4q2p-hwmr-qcxc OPCFoundation.NetStandard.Opc.Ua.Core buffer-management vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 26 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Opcfoundation
Opcfoundation ua-.netstandard
CPEs cpe:2.3:a:opcfoundation:ua-.netstandard:*:*:*:*:*:*:*:*
Vendors & Products Opcfoundation
Opcfoundation ua-.netstandard
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T02:42:59.324Z

Reserved: 2024-04-27T00:00:00.000Z

Link: CVE-2024-33862

cve-icon Vulnrichment

Updated: 2024-08-02T02:42:59.324Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-05T23:15:10.050

Modified: 2024-11-21T09:17:36.807

Link: CVE-2024-33862

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses