Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1301: CWE-787 Out-of-bounds Write in o6 Automation GmbH Open62541

0
Medium
VulnerabilityCVE-2026-1301cvecve-2026-1301cwe-787
Published: Thu Feb 05 2026 (02/05/2026, 19:09:37 UTC)
Source: CVE Database V5
Vendor/Project: o6 Automation GmbH
Product: Open62541

Description

In builds with PubSub and JSON enabled, a crafted JSON message can cause the decoder to write beyond a heap-allocated array before authentication, reliably crashing the process and corrupting memory.

AI-Powered Analysis

AILast updated: 02/05/2026, 19:29:36 UTC

Technical Analysis

CVE-2026-1301 is an out-of-bounds write vulnerability classified under CWE-787 found in the Open62541 open-source implementation of OPC UA by o6 Automation GmbH. This vulnerability specifically affects builds where PubSub (Publish-Subscribe) and JSON encoding are enabled. The flaw arises when the decoder processes a crafted JSON message that causes it to write beyond the bounds of a heap-allocated array. This occurs before any authentication step, allowing an unauthenticated attacker to send maliciously crafted JSON data over the network. The consequence is reliable process crashes and memory corruption, which could lead to denial of service or potentially enable further exploitation such as arbitrary code execution depending on the memory corruption impact. The vulnerability has a CVSS 4.0 base score of 6.8, indicating medium severity. The attack vector is network-based with low attack complexity, no privileges required, but user interaction is necessary to trigger the vulnerability. No patches or exploits are currently publicly available, but the affected version is identified as 1.5-rc1. Open62541 is widely used in industrial automation and IoT devices implementing OPC UA protocols, making this vulnerability relevant to critical infrastructure and industrial control systems.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a risk of denial of service through process crashes and memory corruption. Systems relying on Open62541 for OPC UA communication with PubSub and JSON enabled could be disrupted, impacting operational technology environments. The unauthenticated nature of the attack increases exposure, as attackers can send malicious JSON messages over the network without credentials. This could lead to temporary outages, loss of control, or in worst cases, facilitate further exploitation if memory corruption is leveraged. The impact is particularly significant for industries with high reliance on OPC UA for real-time data exchange and control, such as automotive manufacturing, energy grids, and smart factories prevalent in Europe. Disruptions could affect production lines, safety systems, and data integrity, leading to financial and reputational damage.

Mitigation Recommendations

Organizations should monitor for updates from o6 Automation GmbH and apply patches or upgrades to versions beyond 1.5-rc1 once available. Until patches are released, it is critical to disable PubSub and JSON encoding features if not strictly necessary or to implement strict input validation and filtering on JSON messages at network boundaries. Network segmentation should be enforced to isolate OPC UA communication channels from untrusted networks and limit exposure to potential attackers. Deploying intrusion detection systems with signatures for anomalous JSON payloads targeting OPC UA may help detect exploitation attempts. Additionally, enforcing strict authentication and authorization policies on OPC UA servers, even though this vulnerability occurs pre-authentication, can reduce overall attack surface. Regular security audits and penetration testing focused on industrial protocols should be conducted to identify and remediate similar risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-01-21T18:52:45.866Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6984ec3ef9fa50a62f33cd86

Added to database: 2/5/2026, 7:15:10 PM

Last enriched: 2/5/2026, 7:29:36 PM

Last updated: 2/5/2026, 9:27:19 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats