Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Adapter for OPC UA

AVEVA Adapter for OPC Module 1​.5 release notes

  • Last UpdatedDec 10, 2025
  • 4 minute read

AVEVA Adapter for OPC UA Module: 1.5

AVEVA Adapter for OPC UA: 1.5.0.373

Adapter Framework: 1.8.1.62

Edge Module Manager: 1.1.1.19

Alpine Linux: 3.18.4

Overview

AVEVA Adapter for OPC UA Module is the containerized version of the adapter that can be deployed using Edge Management on AVEVA Connect. It offers the same capabilities as the adapter that is available for installation directly on the device.

To review the adapter's capabilities as well as enhancements and fixes, see the Release Notes.

Fixes and enhancements

This updated release contains adapter framework updates.

Fixes

The following issues reported from earlier versions are fixed in this release.

  • None

Enhancements

The following enhancements are added in this release.

  • Added support for Polling mode for data collection

Known issues

There are no known issues at this time.

Setup

System requirements

See the System requirements for information on the installation kits available.

Installation and upgrade

See AVEVA Edge Management Deployment for additional information

Uninstalling the adapter

Refer to Uninstall the adapter.

Security information and guidance

AVEVA is committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.

AVEVA proactively discloses aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.

Overview of new vulnerabilities - Fixed or mitigated

This section is intended to provide relevant security-related information to guide your installation or upgrade decision. AVEVA is proactively disclosing aggregate information about the number and severity of AVEVA Adapter for OPC UA Edge Module security vulnerabilities that are fixed in this release.

For this release of AVEVA Adapter for OPC UA, the following vulnerabilities have been identified or fixed.

Security vulnerabilities fixed in AVEVA Adapter for OPC UA Edge Module 1.5.0.373 release

The information below applies to vulnerabilities fixed in the AVEVA Adapter for OPC UA 1.5.0.373, which is included in this release

Severity Category

CVSS Base Score Range

Number of Fixed Vulnerabilities

Critical

9 - 10

1

High

7.0 - 8.9

2

Medium

4.0 - 6.9

1

Low

0 - 3.9

0

Vulnerability mitigations in AVEVA Adapter for OPC UA Edge Module 1.5 release

The following vulnerabilities were identified in AVEVA Adapter for OPC UA Edge Module 1.5 release.

Component

Version

CVE or Reference

CVSS

Mitigation

zlib

1.2.13

CVE-2023-45853 (https://nvd.nist.gov/vuln/detail/CVE-2023-45853)

9.8

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module's utilization of zlib through the .NET 6 Framework does not expose this vulnerability.

OpenSSL

3.1.4

CVE-2024-4603 (https://nvd.nist.gov/vuln/detail/CVE-2024-4603)

4.6

Vulnerability is not applicable:

Vulnerable code not in execution path.

OpenSSL

3.1.4

CVE-2024-2511 (https://nvd.nist.gov/vuln/detail/CVE-2024-2511)

6.5

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

OpenSSL

3.1.4

BDSA-2024-3135

6.8

Vulnerability is not applicable:

This vulnerability relies on the application executing the SSL_free_buffers function directly, and Edge Systems are using it exclusively through .NET.

OpenSSL

3.1.4

CVE-2023-6129 (https://nvd.nist.gov/vuln/detail/CVE-2023-6129)

6.5

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

OpenSSL

3.1.4

CVE-2024-0727 (https://nvd.nist.gov/vuln/detail/CVE-2024-0727)

5.5

Vulnerability is not reachable:

This vulnerability relies on application loading malformed PKCS12 file from disk since edge module's file system can be accessed only by administrators this is considered as low risk.

OpenSSL

3.1.4

CVE-2023-6237 (https://nvd.nist.gov/vuln/detail/CVE-2023-6237)

4.6

Vulnerability is not applicable:

This vulnerability is not exposed by the use of OpenSSL in AVEVA Adapter for OPC UA Module.

Microsoft PowerShell

7.2.7

CVE-2023-36013 (https://nvd.nist.gov/vuln/detail/CVE-2023-36013)

6.8

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

krb5

1.20.1

CVE-2024-26458 (https://nvd.nist.gov/vuln/detail/CVE-2024-26461)

6.5

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

krb5

1.20.1

CVE-2024-26461 (https://nvd.nist.gov/vuln/detail/CVE-2024-26461)

6.5

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

krb5

1.20.1

CVE-2024-26462 (https://nvd.nist.gov/vuln/detail/CVE-2024-26462)

6.5

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

krb5

1.20.1

CVE-2023-36054 (https://nvd.nist.gov/vuln/detail/CVE-2023-36054)

6.5

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

dotnet/core-setup

6.0.23

CVE-2024-30045 (https://nvd.nist.gov/vuln/detail/CVE-2024-30045)

6.3

Vulnerability is not applicable:

Not listed as a .NET 6 vulnerability

dotnet/core-setup

6.0.23

CVE-2024-30046 (https://nvd.nist.gov/vuln/detail/CVE-2024-30046)

5.2

Vulnerability is not applicable:

Not listed as a .NET 6 vulnerability

busybox

1.36.1

CVE-2023-42363 (https://nvd.nist.gov/vuln/detail/CVE-2023-42363)

6.1

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

busybox

1.36.1

CVE-2023-42364 (https://nvd.nist.gov/vuln/detail/CVE-2023-42364)

6.1

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

busybox

1.36.1

CVE-2023-42365 (https://nvd.nist.gov/vuln/detail/CVE-2023-42365)

6.1

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

busybox

1.36.1

CVE-2023-42366 (https://nvd.nist.gov/vuln/detail/CVE-2023-42366)

6.1

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

busybox

1.36.1

CVE-2022-48174 (https://nvd.nist.gov/vuln/detail/CVE-2022-48174)

6.7

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

busybox

1.36.1

CVE-2023-39810 (https://nvd.nist.gov/vuln/detail/CVE-2023-39810)

7.8

Vulnerability is not applicable:

The AVEVA Adapter for OPC UA Module is not affected by this vulnerability.

Technical support and resources

Refer to Technical support and feedback.

In This Topic
TitleResults for “How to create a CRG?”Also Available in