CVE-2022-29865
Description
OPC UA .NET Standard Stack allows a remote attacker to bypass the application authentication check via crafted fake credentials.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2022-29865 allows a remote attacker to bypass application authentication in the OPC UA .NET Standard Stack using crafted fake credentials.
Vulnerability
Overview
The OPC UA .NET Standard Stack, an OPC Foundation reference implementation for OPC Unified Architecture on .NET platforms, contains an authentication bypass vulnerability tracked as CVE-2022-29865. The flaw lies in the incorrect implementation of the authentication algorithm, which allows a remote attacker to craft fake credentials that bypass the application's authentication check entirely [1][3][4].
Exploitation and
Attack Surface
This vulnerability can be exploited remotely over the network, requiring no prior authentication or user interaction. The attack targets the UA-TCP or HTTPS transport layers used by OPC UA applications built on the affected .NET Standard Stack. An attacker with network access to an OPC UA server can send specially crafted authentication tokens that the stack incorrectly validates as legitimate [2][4].
Impact
Successful exploitation grants the attacker unauthorized access to the OPC UA server, bypassing all configured application-level authentication mechanisms. This could allow the attacker to read or manipulate process data, issue commands to industrial control systems, or disrupt operations, depending on the server's configuration and the privileges associated with the bypassed authentication [3][4].
Mitigation
Status
The OPC Foundation released a security bulletin and the project maintainers have addressed the issue in subsequent versions of the UA-.NETStandard Stack. Users are advised to update to the patched version as recommended in the official advisory. No workarounds are currently documented, and the vulnerability is not yet known to be exploited in the wild [3][4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
OPCFoundation.NetStandard.Opc.Ua.CoreNuGet | < 1.4.368.58 | 1.4.368.58 |
Affected products
2- OPC UA/OPC UA .NET Standard Stackdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-fvxf-r9fw-49pcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-29865ghsaADVISORY
- files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29865.pdfghsax_refsource_MISCWEB
- github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-fvxf-r9fw-49pcghsaWEB
- opcfoundation.org/securityghsaWEB
- opcfoundation.org/security/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.