Skip to content

Insufficient Nonce Validation in Client

Moderate
eclipsewebmaster published GHSA-pq4w-qm9g-qx68 Mar 16, 2020

Package

org.eclipse.milo:sdk-client (java)

Affected versions

<= 0.3.4

Patched versions

0.3.6

Description

Impact

Credential replay affecting those connected to a server when all 3 of the following conditions are met:

  • SecurityPolicy is None
  • using username/password or X509-based authentication
  • the server has a defect causing it to send null/empty or zeroed nonces

Patches

The problem has been patched in version 0.3.6. A more relaxed treatment of validation as agreed upon by the OPC UA Security Working Group is implemented in version 0.3.7.

Workarounds

Do not use username/password or X509-based authentication with SecurityPolicy of None.

References

https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf

For more information

If you have any questions or comments about this advisory:

Severity

Moderate

CVE ID

CVE-2019-19135

Weaknesses

No CWEs