Advisory Database
  • Advisories
  • Dependency Scanning
  1. nuget
  2. ›
  3. OPCFoundation.NetStandard.Opc.Ua
  4. ›
  5. CVE-2020-8867

CVE-2020-8867: Insufficient Session Expiration

April 22, 2020 (updated April 29, 2020)

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application.

References

  • nvd.nist.gov/vuln/detail/CVE-2020-8867
  • opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf
  • www.zerodayinitiative.com/advisories/ZDI-20-536/

Code Behaviors & Features

Detect and mitigate CVE-2020-8867 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.4.358.30

Fixed versions

  • 1.4.358.31

Solution

Upgrade to version 1.4.358.31 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-613: Insufficient Session Expiration

Source file

nuget/OPCFoundation.NetStandard.Opc.Ua/CVE-2020-8867.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:52 +0000.