GHSA-qv5f-57gw-vx3h: Duplicate Advisory: Authorization Bypass in OPC UA .NET Standard Stack
8.6
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
2/10/2025
Updated
3/3/2025
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
OPCFoundation.NetStandard.Opc.Ua | nuget | < 1.5.374.158 | 1.5.374.158 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the use of the deprecated Basic128Rsa15 security policy, which relies on RSA-PKCS1-v1.5. This padding scheme is known to have timing side-channels (CWE-208) and weak key validation
(CWE-639). Functions responsible for selecting the security policy (e.g., GetSecurityPolicy
) and performing RSA decryption (e.g., RsaUtils.Decrypt
) are likely vulnerable. The confidence is medium because the exact code is unavailable, but the CWEs and vulnerability context strongly suggest these components.