CVE-2020-8867

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opcfoundation:unified_architecture_.net-standard:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf - Vendor Advisory () https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-20-536/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-20-536/ - Third Party Advisory, VDB Entry

Information

Published : 2020-04-22 21:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8867

Mitre link : CVE-2020-8867

CVE.ORG link : CVE-2020-8867


JSON object : View

Products Affected

opcfoundation

  • unified_architecture_.net-standard
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition

CWE-613

Insufficient Session Expiration