VYPR
High severityNVD Advisory· Published Jun 16, 2022· Updated Aug 3, 2024

CVE-2022-29865

CVE-2022-29865

Description

OPC UA .NET Standard Stack allows a remote attacker to bypass the application authentication check via crafted fake credentials.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2022-29865 allows a remote attacker to bypass application authentication in the OPC UA .NET Standard Stack using crafted fake credentials.

Vulnerability

Overview

The OPC UA .NET Standard Stack, an OPC Foundation reference implementation for OPC Unified Architecture on .NET platforms, contains an authentication bypass vulnerability tracked as CVE-2022-29865. The flaw lies in the incorrect implementation of the authentication algorithm, which allows a remote attacker to craft fake credentials that bypass the application's authentication check entirely [1][3][4].

Exploitation and

Attack Surface

This vulnerability can be exploited remotely over the network, requiring no prior authentication or user interaction. The attack targets the UA-TCP or HTTPS transport layers used by OPC UA applications built on the affected .NET Standard Stack. An attacker with network access to an OPC UA server can send specially crafted authentication tokens that the stack incorrectly validates as legitimate [2][4].

Impact

Successful exploitation grants the attacker unauthorized access to the OPC UA server, bypassing all configured application-level authentication mechanisms. This could allow the attacker to read or manipulate process data, issue commands to industrial control systems, or disrupt operations, depending on the server's configuration and the privileges associated with the bypassed authentication [3][4].

Mitigation

Status

The OPC Foundation released a security bulletin and the project maintainers have addressed the issue in subsequent versions of the UA-.NETStandard Stack. Users are advised to update to the patched version as recommended in the official advisory. No workarounds are currently documented, and the vulnerability is not yet known to be exploited in the wild [3][4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
OPCFoundation.NetStandard.Opc.Ua.CoreNuGet
< 1.4.368.581.4.368.58

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.