Protocol | OPC-UA |
---|---|
Name | OPC-UA |
Aliases | OPCUA |
Description | Open communication standard for industrial automation and control |
Port(s) | 4840/tcp, 4840/udp, 4843/tcp (TLS) |
Wireshark dissector | OPC-UA Plugin |
Related CVE | CVE-2019-13542, CVE-2021-23230, CVE-2021-42262, CVE-2022-25304, CVE-2022-25888, CVE-2022-25903 |
- OPC UA Deep Dive (Part 1): History of the OPC UA Protocol - Claroty Team82 (2023)
- OPC UA Deep Dive (Part 2): What is OPC UA? - Claroty Team82 (2023)
- OPC UA Deep Dive (Part 3): Exploring the OPC UA Protocol - Claroty Team82 (2023)
- Practical example of fuzzing OPC UA applications - Kaspersky ICS-CERT (2020)
- Understanding the OPC Unified Architecture (OPC UA) Protocol - Anthony King Ho, Control Automation (2023)
- A Broken Chain: Discovering OPC UA Attack Surface and Exploiting the Supply Chain - Eran Jacob @ Black Hat USA (2021)
- Analyzing PIPEDREAM - Challenges in Testing an ICS Attack Toolkit - Jimmy Wylie @ DEF CON 30 (2022)
- Resting on Feet of Clay: Securely Bootstrapping OPC UA Deployments - Alessandro Erba & Nils Ole Tippenhauer @ Black Hat Europe (2021)
- Exploring the OPC attack surface - Claroty Team82 (2021)
- Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems - Alessandro Erba, Anne Müller, Nils Ole Tippenhauer (2021)
- freeopcua - Open Source C++ OPC-UA Server and Client Library
- opcua-client-gui - Simple OPC-UA GUI client
- python-opcua - OPC UA Client and Server in Python
- UA-.NETStandard - Official OPC UA .NET Standard Stack from the OPC Foundation
All unreviewed AI-generated data is marked with
*
. (Why?)