CVE-2024-33862

7.5 HIGH

📋 TL;DR

A memory exhaustion vulnerability in OPC Foundation's OPC UA .NET Standard library allows remote attackers to cause denial of service by sending excessive messages. This affects systems using vulnerable versions of OPCFoundation.NetStandard.Opc.Ua.Core for industrial communication. The vulnerability could disrupt OPC UA server operations in industrial control systems.

💻 Affected Systems

Products:
  • OPCFoundation.NetStandard.Opc.Ua.Core
Versions: Versions before 1.05.374.54
Operating Systems: All platforms using .NET Standard
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any application using the vulnerable OPC UA library for server or client functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service causing OPC UA server unavailability, potentially disrupting industrial processes and operations.

🟠

Likely Case

Service degradation or temporary unavailability of OPC UA communication channels, affecting data collection and control functions.

🟢

If Mitigated

Minimal impact with proper network segmentation and rate limiting in place.

🌐 Internet-Facing: HIGH - Directly exposed OPC UA endpoints can be targeted from the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending excessive messages to trigger memory exhaustion, which is relatively simple to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.05.374.54 and later

Vendor Advisory: https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2024-33862.pdf

Restart Required: Yes

Instructions:

1. Update NuGet package to version 1.05.374.54 or later. 2. Rebuild and redeploy affected applications. 3. Restart OPC UA services.

🔧 Temporary Workarounds

Network Rate Limiting

all

Implement network-level rate limiting on OPC UA endpoints to prevent excessive message flooding.

Network Segmentation

all

Isolate OPC UA systems from untrusted networks using firewalls and network segmentation.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with OPC UA endpoints.
  • Deploy intrusion detection/prevention systems to monitor for excessive message patterns.

🔍 How to Verify

Check if Vulnerable:

Check the version of OPCFoundation.NetStandard.Opc.Ua.Core NuGet package in your project. Versions below 1.05.374.54 are vulnerable.

Check Version:

Check project's packages.config or .csproj file for PackageReference to OPCFoundation.NetStandard.Opc.Ua.Core

Verify Fix Applied:

Verify the package version is 1.05.374.54 or higher and test OPC UA functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusually high message rates
  • Memory exhaustion warnings
  • OPC UA service restarts

Network Indicators:

  • High volume of OPC UA messages from single source
  • Abnormal message patterns

SIEM Query:

source="opc-ua" AND (message_count > threshold OR memory_usage > threshold)

🔗 References

📤 Share & Export