In OPC Foundation OPC UA .NET Standard codebase 1.4.357.28, servers do not create sufficiently random numbers in OPCFoundation.NetStandard.Opc.Ua before 1.4.359.31, which allows man in the middle attackers to reuse encrypted user credentials sent over the network.
References
Link | Resource |
---|---|
https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf | Patch Vendor Advisory |
https://opcfoundation.org/security-bulletins/ | Vendor Advisory |
https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf | Patch Vendor Advisory |
https://opcfoundation.org/security-bulletins/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf - Patch, Vendor Advisory | |
References | () https://opcfoundation.org/security-bulletins/ - Vendor Advisory |
Information
Published : 2020-03-16 16:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19135
Mitre link : CVE-2019-19135
CVE.ORG link : CVE-2019-19135
JSON object : View
Products Affected
opcfoundation
- netstandard.opc.ua
- ua-.netstandard
CWE
CWE-330
Use of Insufficiently Random Values