Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-33916: Home Page - OPC Foundation

OPC UA .NET Standard Reference Server 1.04.368 allows a remote attacker to cause the application to access sensitive information.

CVE
#mac#microsoft#sap

Welcome to the World of OPC

In today’s complex economy, information is the key to business success and profitability. OPC technologies were created to allow information to be easily and securely exchanged between diverse platforms from multiple vendors and to allow seamless integration of those platforms without costly, time-consuming software development. This frees engineering resources to do the more important work of running your business. Today, there are more than 4,200 suppliers who have created more than 35,000 different OPC products used in more than 17 million applications. The estimate of the savings in engineering resources alone is in the billions of dollars.

OPC News

OPC Foundation Elects Board of Directors Members and Names Dr. Holger Kenn as Chairman

Growing OPC Foundation Board of Directors member diversity reflects the expanding role OPC UA plays in OT and IT. Scottsdale, AZ – May 31st, 2022 –The OPC Foundation is proud to welcome Dr. Holger Kenn (Microsoft), Mr. Claudius Link (SAP), Mr. Andreas Faath (VDMA), Mr. Aurelien Le Sant (Schneider-Electric) and Dr. Kazuhiro Kusunoki (Mitsubishi Electric) […]

Everything is moving – OPC UA Companion Specification „Global Positioning”

Cooperation between AIM, OPC Foundation and PROFIBUS&PROFINET International Scottsdale, AZ, May 24th, 2022: Everything is moving – this expression best describes the dynamics in production and logistics today. Products, robots, autonomous vehicles, and humans in between. To ensure a smooth production flow in such a mobile environment, machines and software systems need a common understanding […]

CISA Alert (AA22-103A): APT Cyber Tools Targeting ICS/SCADA Devices

As recently reported by CISA (The Cybersecurity and Infrastructure Security Agency – a division of the U.S. Department of Homeland Security), a set of tools have been discovered that can be used to compromise Industrial Control Systems. Unfortunately, the report also incorrectly suggested that the tools compromise OPC UA Servers. https://www.cisa.gov/uscert/ncas/alerts/aa22-103a This claim is not […]

Related news

CVE-2022-38108: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

CVE-2022-36957: Published | Zero Day Initiative

SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with Orion admin-level account access to SolarWinds Web Console to execute arbitrary commands.

GHSA-mw9h-hcp7-fgc6: Exposure of Sensitive Information in OPCFoundation.NetStandard.Opc.Ua.Server

OPC UA .NET Standard Reference Server 1.04.368 allows a remote attacker to cause the application to access sensitive information.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907