Vulnerability Description
A buffer-management vulnerability in OPC Foundation OPCFoundation.NetStandard.Opc.Ua.Core before 1.05.374.54 could allow remote attackers to exhaust memory resources. It is triggered when the system receives an excessive number of messages from a remote source. This could potentially lead to a denial of service (DoS) condition, disrupting the normal operation of the system.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20
- https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20
FAQ
What is CVE-2024-33862?
CVE-2024-33862 is a vulnerability with a CVSS score of 7.5 (HIGH). A buffer-management vulnerability in OPC Foundation OPCFoundation.NetStandard.Opc.Ua.Core before 1.05.374.54 could allow remote attackers to exhaust memory resources. It is triggered when the system r...
How severe is CVE-2024-33862?
CVE-2024-33862 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-33862?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.