VYPR
Moderate severityNVD Advisory· Published Apr 22, 2020· Updated Aug 4, 2024

CVE-2020-8867

CVE-2020-8867

Description

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated remote attacker can cause a denial-of-service in OPC UA .NET Standard due to missing locking in session handling.

Vulnerability

Analysis

CVE-2020-8867 is a denial-of-service vulnerability in the OPC Foundation UA .NET Standard, specifically in version 1.04.358.30. The flaw resides in the way the software handles sessions. The root cause is a race condition due to the lack of proper locking when performing operations on an object, leading to undefined behavior when concurrent requests are processed [1][3].

Attack

Vector

An attacker can exploit this vulnerability remotely without any authentication. By sending crafted requests that trigger the race condition during session creation or management, the attacker can cause the application to crash or become unresponsive. No special privileges or user interaction are required [1][3].

Impact

Successful exploitation results in a denial-of-service condition, rendering the OPC UA server unavailable. This can disrupt industrial control systems or other critical infrastructure that relies on the OPC UA protocol for machine-to-machine communication [1][3].

Mitigation

The vulnerability has been patched in version 1.4.359.31, released shortly after disclosure. Users are strongly advised to update to this or a later version. The issue was discovered through the Zero Day Initiative (ZDI-20-536) and has no known workarounds [2][3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
OPCFoundation.NetStandard.Opc.UaNuGet
< 1.4.359.311.4.359.31

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.