CVE-2018-12086
Description
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stack-based buffer overflow in OPC UA applications allows remote attackers to trigger a crash or arbitrary code execution via crafted requests.
Vulnerability
The vulnerability is a buffer overflow in OPC UA applications that allows remote attackers to trigger a stack overflow by sending carefully crafted requests. The official description does not specify a particular vendor or product, but GitHub Advisory Database [2] identifies the affected package as OPCFoundation.NetStandard.Opc.Ua on NuGet, with affected versions up to and including 1.4.352.12. The overflow occurs when handling structured OPC UA requests, leading to a stack buffer overflow.
Exploitation
An attacker can exploit this vulnerability by sending specially crafted OPC UA requests over the network to a vulnerable application. No authentication is mentioned as a prerequisite, so the attack can likely be performed by an unauthenticated remote attacker. The overflow is triggered during request parsing or processing, without requiring user interaction.
Impact
Successful exploitation could allow an attacker to cause a denial of service via application crash (stack overflow) or potentially achieve arbitrary code execution on the affected system. The impact is high severity (CVSS base score 8.6, High) [2], indicating a significant risk of compromise.
Mitigation
The vulnerability is patched in version 1.4.353.15 of the OPCFoundation.NetStandard.Opc.Ua package [2]. Users should upgrade to this or a later version. An OpenSUSE security announcement [1] also provides a fix for affected distributions. No workarounds are described in the available references; if an upgrade is not immediately possible, network-level filtering or restrictions on OPC UA port access may reduce exposure.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
OPCFoundation.NetStandard.Opc.UaNuGet | < 1.4.353.15 | 1.4.353.15 |
Affected products
40- ghsa-coords40 versionspkg:nuget/opcfoundation.netstandard.opc.uapkg:rpm/opensuse/libmaxminddb&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/spandsp&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/wireshark&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/wireshark&distro=openSUSE%20Tumbleweedpkg:rpm/suse/libmaxminddb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/libmaxminddb&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/libmaxminddb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/libmaxminddb&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/libmaxminddb&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/spandsp&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/spandsp&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/spandsp&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/spandsp&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP1pkg:rpm/suse/spandsp&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/spandsp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/wireshark&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP4pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP1pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/wireshark&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4pkg:rpm/suse/wireshark&distro=SUSE%20OpenStack%20Cloud%207
< 1.4.353.15+ 39 more
- (no CPE)range: < 1.4.353.15
- (no CPE)range: < 1.4.2-lp151.3.3.1
- (no CPE)range: < 0.0.6-lp151.3.3.1
- (no CPE)range: < 3.2.2-lp151.2.9.1
- (no CPE)range: < 3.4.8-1.2
- (no CPE)range: < 1.4.2-1.3.1
- (no CPE)range: < 1.4.2-1.3.1
- (no CPE)range: < 1.4.2-1.3.1
- (no CPE)range: < 1.4.2-1.3.1
- (no CPE)range: < 1.4.2-1.3.1
- (no CPE)range: < 0.0.6-3.2.1
- (no CPE)range: < 0.0.6-3.2.1
- (no CPE)range: < 0.0.6-3.2.1
- (no CPE)range: < 0.0.6-3.2.1
- (no CPE)range: < 0.0.6-3.2.1
- (no CPE)range: < 0.0.6-3.2.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 3.2.2-3.35.2
- (no CPE)range: < 3.2.2-3.35.2
- (no CPE)range: < 2.4.10-3.12.2
- (no CPE)range: < 3.2.2-3.35.2
- (no CPE)range: < 2.4.10-3.12.2
- (no CPE)range: < 3.2.2-3.35.2
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 3.2.2-3.35.2
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 3.2.2-3.35.2
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
- (no CPE)range: < 2.4.10-48.32.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.htmlghsavendor-advisoryx_refsource_SUSEWEB
- github.com/advisories/GHSA-782p-53wq-cxmjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-12086ghsaADVISORY
- www.debian.org/security/2018/dsa-4359ghsavendor-advisoryx_refsource_DEBIANWEB
- www.securityfocus.com/bid/105538ghsavdb-entryx_refsource_BIDWEB
- www.securitytracker.com/id/1041909ghsavdb-entryx_refsource_SECTRACKWEB
- opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12086.pdfghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.