Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Connector for OPC UA Gen 1

Release notes

  • Last UpdatedJun 10, 2025
  • 4 minute read

PI Connector for OPC UA

1.3.1.142

Overview

PI Connector for OPC UA copies contextual and time-series data from OPC UA (OLE for Process Control Unified Architecture) servers to AVEVA PI Data Archive and Asset servers. Static OPC UA variables are mapped to PI Asset Framework elements and attributes, and dynamic variables are converted to PI Points..

Fixes and Enhancements

Fixes

This section lists items that were resolved in this release of PI Connector for OPC UA:

Work Items

Description

50295

Completed a bug fix to show the attributes count in the ReadBlockSize parameter, rather than the NodeId count.

50382

Completed a bug to enable export of the Available TypeDefinition when the TagOnly filter file was loaded.

50385

Completed a bug fix to correct connector failure following a datasource update related to a user/password change.

50390

Completed a bug fix to correct a failure to validate Timeout parameters.

50409

Completed a bug fix so that in TagOnly mode only tags presented in the filter file are updated.

50420

Completed a bug fix to properly update the Static Enum variable.

50427

Completed a bug fix to ensure that all history recovery periods are processed in the event that the connector loses connection during startup to the datasource.

50438

Completed a bug fix to correct the triggering errors in the method CheckDuplicateSessionId.

50439

Completed a bug fix to correct a failure to recognize the ‘,’ character in a NodeId or CustomStreamId.

96103

This version includes the addition of a datasource configuration parameter that allows the user the option of ignoring a Bad_WaitingForInitialData status.

Enhancements

This section lists items that were resolved in this release of PI Connector for OPC UA:

Work Items

Description

50287

Added the ‘Connector’ timestamp option for servers that are not able to provide correct event timestamps.

50332

Allowed a disable creation of subscription option for servers that do not support subscription for static variables (property)..

50416

Added a feature so that if a connector service account does not have access to the type definition file, startup type “cache” can be used in “tag-only” mode to re-create PI Points in a new type definition file.

113580

Compilation with Tau framework version 1.3.3.

Known Issues

There are no known issues for this release

System Requirements

Operating Systems

This release supports Microsoft Windows 64-bit 8.1, 10 or later..

Server Platforms

This release supports Microsoft Windows Server 2012 or later.

Distribution Kit Files

Product

Software Version

Microsoft .NET Framework 4.8 Setup

4.8

Microsoft Visual C++ 2019 Redistributable (x86)

14.21.27702

Microsoft Visual C++ 2019 Redistributable (x64)

14.21.27702

PI AF Client 2018 SP3 Patch 2

2.10.8.440

PI Connector for OPC UA

1.3.1.142

Installation and Upgrade

Installing PI Connector for OPC UA

The PI Connector for OPC UA can be installed or upgraded using the installation kit. This installation kit can be obtained by using the How to Download Products link listed in the AVEVA Customer Portal How To's list. This list is located on the Customer Portal site.

For additional information regarding the PI Connector for OPC UA installation, refer to Install the connector in the user guide. The user guide is located in the PI Connectors section of the Doc Library.

Uninstalling PI Connector for OPC UA

The PI Connector for OPC UA can be uninstalled using the Programs and Features list accessible from the Windows Control Panel. After accessing the Programs and Features list, select the PI Connector for OPC UA and then select Uninstall to uninstall the interface.

Security information and guidance

We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.

We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.

No additional security vulnerabilities are applicable to this release.

Overview of New Vulnerabilities Found or Fixed

For this release of PI Connector for OPC UA, three high security vulnerabilities have been identified and fixed. The category of High (7.0-8.9) is based on the CVSS scoring system. These high-level security issues have been resolved in the PI Connector for OPC UA itself and PI AF Client 2018 SP3 Patch 2 sub-component which have been packaged in this release. To reduce exposure to these security issues, upgrade to the latest release.

Subcomponents of this release contain known vulnerabilities which are not exploitable in PI Connector for OPC UA.

This table lists the known vulnerabilities along with their mitigation in this product.

Component

Version

CVE or Reference

CVSS

Mitigation

jQuery

2.1.3

jQuery 2.2 and 1.12 Released (https://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/)

7.9

The referenced component uglify.js is not used in this product’s development process.

jQuery

2.1.3

CVE-2015-9251

6.1

No cross-domain AJAX requests are made.

jQuery

2.1.3

CVE-2019-11358

6.1

Input is sanitized for all calls to the referenced ‘extend’ function.

jQuery

2.1.3

https://github.com/jquery/jquery/issues/2965

8.6

Input is sanitized for all calls to the referenced ‘parseHTML’ function.

jQuery UI

1.8.23

CVE-2016-7103

6.1

The referenced property ‘closeText’ is not used.

jQuery UI

1.8.23

CVE-2010-5312

4.3

The referenced “jQuery UI dialog” widget is not used.

Knockout JS

3.3.0

https://github.com/knockout/knockout/issues/1244

8.6

This product is not supported for use in Internet Explorer 7 (IE7).

Knockout JS

3.3.0

CVE-2019-14862

6.1

This product is not supported for use in Internet Explorer 7 (IE7).

Bouncy Castle

1.8.1

CVE-2020-15522

5.9

This vulnerability does not apply to PI Connectors because they do not use ECDSA Encryption.

In This Topic
TitleResults for “How to create a CRG?”Also Available in