CVE-2018-7559: Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
(updated )
An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit . A vulnerability in OPC UA applications can allow a remote attacker to determine a Server’s private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack.
References
- www.securityfocus.com/bid/108688
- github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45
- github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150
- nvd.nist.gov/vuln/detail/CVE-2018-7559
- opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-7559.pdf
Detect and mitigate CVE-2018-7559 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →