CVE-2022-29863
Description
OPC UA .NET Standard Stack 1.04.368 allows remote attacker to cause a crash via a crafted message that triggers excessive memory allocation.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
OPC UA .NET Standard Stack 1.04.368 can be crashed by a remote attacker sending a crafted message that triggers excessive memory allocation.
Vulnerability
Overview
CVE-2022-29863 is a denial-of-service vulnerability in the OPC UA .NET Standard Stack version 1.04.368. The root cause is that the stack does not properly validate the size of a memory allocation requested by a specially crafted OPC UA message, allowing an attacker to force the allocation of an excessive amount of memory [2]. This can lead to resource exhaustion and cause the application to crash [1].
Attack
Vector
The vulnerability can be exploited remotely over the network. An attacker sends a malicious OPC UA message to an affected server or client using the stack. No authentication is required; the crafted message alone triggers the excessive memory allocation. The attack surface includes any application that uses the vulnerable OPC UA .NET Standard Stack version 1.04.368 [3].
Impact
Successful exploitation results in a denial of service (DoS), crashing the OPC UA application. This disrupts industrial control and automation processes that rely on the OPC UA communication protocol. The impact is limited to availability; there is no evidence of code execution or data leakage [2].
Mitigation
The OPC Foundation released a fix in a later version of the stack. Users should update to a patched version, such as 1.04.368.1 or later. The advisory from the OPC Foundation provides details on the affected versions and remediation steps [3]. As of the publication date, this CVE is not listed in CISA's Known Exploited Vulnerabilities catalog.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
OPCFoundation.NetStandard.Opc.Ua.CoreNuGet | < 1.4.368.58 | 1.4.368.58 |
Affected products
2- OPC UA/OPC UA .NET Standard Stackdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-r7pq-3x6p-7jcmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-29863ghsaADVISORY
- files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29863.pdfghsax_refsource_MISCWEB
- github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-r7pq-3x6p-7jcmghsaWEB
- opcfoundation.org/security/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.