VYPR
High severityNVD Advisory· Published Jun 16, 2022· Updated Aug 3, 2024

CVE-2022-29864

CVE-2022-29864

Description

OPC UA .NET Standard Stack 1.04.368 allows a remote attacker to cause a server to crash via a large number of messages that trigger Uncontrolled Resource Consumption.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

OPC UA .NET Standard Stack 1.04.368 is vulnerable to a denial-of-service (DoS) via uncontrolled resource consumption triggered by a large number of messages.

Vulnerability

Overview

CVE-2022-29864 is a denial-of-service (DoS) vulnerability affecting the OPC UA .NET Standard Stack version 1.04.368. The root cause is uncontrolled resource consumption: a remote attacker can send a large number of messages to a server running this stack, causing it to exhaust available resources and crash. The issue is classified as a resource consumption problem, leading to server unavailability [1][2].

Attack

Vector and Prerequisites

An attacker can exploit this vulnerability remotely without needing authentication or special privileges. The only requirement is network access to the OPC UA server endpoint. By flooding the server with a high volume of messages, the attacker triggers the uncontrolled resource consumption condition. The OPC UA .NET Standard Stack is a reference implementation targeting .NET Framework, .NET, and .NET Standard 2.1, meaning any application built on these versions could be exposed if left unpatched [1][2].

Impact

Successful exploitation results in a complete denial of service, crashing the OPC UA server. This disrupts industrial communication systems that rely on OPC UA for data exchange, potentially halting production lines, causing data loss, or requiring manual intervention to restore service. No data breach or code execution is reported, but the availability impact is high [2].

Mitigation and

Status

The OPC Foundation released a security bulletin and advisory (GHSA-vhfw-v69p-crcw) in June 2022 detailing the vulnerability and urging users to update to a patched version. Operators should upgrade the OPC UA .NET Standard Stack to a fixed release. There is no evidence of exploitation in the wild, but given the criticality of OPC UA in industrial environments, patching is strongly recommended [2][3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
OPCFoundation.NetStandard.Opc.Ua.CoreNuGet
< 1.4.368.581.4.368.58

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.