Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Connector for OPC UA Gen 2

Release notes

  • Last UpdatedJun 10, 2025
  • 3 minute read

PI Connector for OPC UA: 2.1.3.2

Connector Framework: 2.8.7

Overview

PI Connector for OPC UA copies contextual and time-series data from Open Platform Communications Unified Architecture (OPC UA) servers to PI Data Archive and Asset servers. Static OPC UA variables are mapped to PI Asset Framework elements and attributes, and dynamic variables are converted to PI Points.

This release addresses the work item listed below.

Fixes and Enhancements

Enhancements

This section lists enhancements that were added in this release of PI Connector for OPC UA Gen 2:

Work Items

Description

114773

Implement Managed Code Signing for all executable files.

118478

Enhance message logging where OPC UA multi-state discrete variables have duplicated text values.

Fixes

This section lists items fixed in this release of PI Connector for OPC UA Gen 2:

Work Items

Description

114575

Specifying any DataChangeTrigger value in the TagsOnly Mode filter file does not trigger a subscription call for a monitored item.

117956

Digital tags stop updating after connector service restart.

Known Issues

There are no known issues for this release.

Security information and guidance

We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.

We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.

No additional security vulnerabilities are applicable to this release.

Vulnerabilities Found or Fixed

This section is intended to provide relevant security-related information to guide your installation or upgrade decision. We are proactively disclosing aggregate information about the number and severity of PI Connector for OPC UA Gen 2 security vulnerabilities that are fixed in this release.

For this release of PI Connector for OPC UA Gen 2, there were no vulnerabilities identified or fixed.

Severity Category

CVSS Base Score Range

Number of Fixed Vulnerabilities

Critical

9 - 10

0

High

7.0 - 8.9

0

Medium

4.0 - 6.9

0

Low

0 - 3.9

0

Security Vulnerabilities mitigated in PI Connector for OPC UA Gen 2 2.1.3.2 Release

This table lists the known vulnerabilities along with their mitigation in this product.

Component

Version

CVE or Reference

CVSS

Mitigation

Angular

6.1.10

BDSA-2020-4763
CVE-2021-4231

8.1

Vulnerable code is not in execution path.

ag-grid

12.0.2

BDSA-2024-4078
CVE-2024-38996

8.8

Vulnerable code cannot be controlled by adversary.

ag-grid

12.0.2

BDSA-2024-7245
CVE-2024-39001

7.3

Vulnerable code cannot be controlled by adversary.

ag-grid

12.0.2

CVE-2017-16009

6.1

Vulnerable code is not in execution path.

ag-grid

12.0.2

BDSA-2016-1698

5.6

Vulnerable code is not in execution path.

OpenSSL

1.1.1t

BDSA-2024-7353
CVE-2024-9143

7.1

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2024-3135
CVE-2024-4741

6.8

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2023-0610
CVE-2023-0464

6.5

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2023-1972
CVE-2023-3817

6.5

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2024-0202
CVE-2024-0727

6.5

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2024-0977
CVE-2024-2511

6.5

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2024-4055
CVE-2024-5535

5.7

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2025-0346
CVE-2024-13176

5.2

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2023-0692
CVE-2023-0465

4.6

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2023-0691
CVE-2023-0466

4.6

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2023-1337
CVE-2023-2650

4.6

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2023-1866
CVE-2023-3446

4.6

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2023-3046
CVE-2023-5678

4.6

Vulnerability is not exposed through execution path.

OpenSSL

1.1.1t

BDSA-2023-2389
CVE-2023-4807

3.2

Vulnerability is not exposed through execution path.

Distribution Kit Files

Product

Software Version

PI Connector for OPC UA

2.1.3.2

In This Topic
TitleResults for “How to create a CRG?”Also Available in