Release notes
- Last UpdatedJan 21, 2025
- 3 minute read
- PI System
- PI Connector for UFL 1.3.2.139
- Connectors
PI Connector for UFL
1.3.2.139
Overview
PI Connector for UFL transfers contextual and time-series data from textual data sources, such as ASCII and Unicode (UTF-8), to the PI System.
AF elements and event frames, along with PI points, are created automatically when the connector receives data that pass the filters specified in the configuration (.ini) file.
Fixes and Enhancements
Fixes
This section lists fixes resolved in this release of PI Connector for UFL:
|
Work Items |
Description |
|---|---|
|
93051 |
Eliminated the need for connector restart following reconfiguration of StoreInPIMode or IncomingTimeStamps. |
|
93895 |
REST Client mode modified so that cookie HTTP Headers are no longer ignored. |
Enhancements
This section lists enhancements included in this release of PI Connector for Siemens SIMATIC PCS 7:
|
Work Items |
Description |
|---|---|
|
117408 |
Improved data processing performance through the configuration of Newline. |
|
118685 |
Compilation with Tau framework version 1.3.3. |
Known Issues
There are no known issues for this release
System Requirements
Operating Systems
This release supports Microsoft Windows 64-bit 8.1, 10 or later.
Server Platforms
This release supports Microsoft Windows Server 2012 or later.
Distribution Kit Files
|
Product |
Software Version |
|---|---|
|
Microsoft .NET Framework 4.8 Setup |
4.8 |
|
Microsoft Visual C++ 2019 Redistributable (x86) |
14.21.27702.2 |
|
Microsoft Visual C++ 2019 Redistributable (x64) |
14.21.27702.2 |
|
PI AF Client 2018 SP3 Patch 2 |
2.10.8.440 |
|
PI Connector for UFL |
1.3.2.169 |
Installation and Upgrade
Installing PI Connector for UFL
The PI Connector for UFL can be installed or upgraded using the installation kit. This installation kit can be obtained by using the How to Download Products link listed in the Customer Portal How To's list. This list is located on the Customer Portal site.
For additional information regarding the PI Connector for UFL installation, refer to Install the connector in the user guide. The user guide is located in the PI Connectors section of the Doc Library.
Uninstalling PI Connector for UFL
The PI Connector for UFL can be uninstalled using the Programs and Features list accessible from the Windows Control Panel. After accessing the Programs and Features list, select the PI Connector for UFL and then select Uninstall to uninstall the interface.
Security information and guidance
We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.
We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.
No additional security vulnerabilities are applicable to this release.
Overview of New Vulnerabilities Found or Fixed
For this release of PI Connector for UFL, three high security vulnerabilities have been identified and fixed. The category of High (7.0-8.9) is based on the CVSS scoring system. These high-level security issues have been resolved in the PI Connector for UFL itself and PI AF Client 2018 SP3 Patch 2 sub-component which have been packaged in this release. To reduce exposure to these security issues, upgrade to the latest release.
Subcomponents of this release contain known vulnerabilities which are not exploitable in PI Connector for Siemens SIMATIC PCS 7.
This table lists the known vulnerabilities along with their mitigation in this product.
|
Component |
Version |
CVE or Reference |
CVSS |
Mitigation |
|---|---|---|---|---|
|
jQuery |
2.1.3 |
jQuery 2.2 and 1.12 Released (https://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/) |
7.9 |
The referenced component uglify.js is not used in this product’s development process. |
|
jQuery |
2.1.3 |
CVE-2015-9251 |
6.1 |
No cross-domain AJAX requests are made. |
|
jQuery |
2.1.3 |
CVE-2019-11358 |
6.1 |
Input is sanitized for all calls to the referenced ‘extend’ function. |
|
jQuery |
2.1.3 |
https://github.com/jquery/jquery/issues/2965 |
8.6 |
Input is sanitized for all calls to the referenced ‘parseHTML’ function. |
|
jQuery UI |
1.8.23 |
CVE-2016-7103 |
6.1 |
The referenced property ‘closeText’ is not used. |
|
jQuery UI |
1.8.23 |
CVE-2010-5312 |
4.3 |
The referenced “jQuery UI dialog” widget is not used. |
|
Knockout JS |
3.3.0 |
https://github.com/knockout/knockout/issues/1244 |
8.6 |
This product is not supported for use in Internet Explorer 7 (IE7). |
|
Knockout JS |
3.3.0 |
CVE-2019-14862 |
6.1 |
This product is not supported for use in Internet Explorer 7 (IE7). |
|
Bouncy Castle |
1.8.1 |
CVE-2020-15522 |
5.9 |
This vulnerability does not apply to PI Connectors because they do not use ECDSA Encryption. |
Microsoft Software Security Defenses
In addition to finding and fixing security bugs within the PI Connector for UFL, it is equally critical that we leverage security defenses provided by the Microsoft Visual C++ compiler that builds it and the Microsoft Windows operating system that runs it. Over the past decade, Microsoft has continually added new defenses and improved existing defenses with successive versions of the compiler and the operating system. To learn more about many of these key defenses, consult the Microsoft white paper, Mitigating Software Vulnerabilities (https://download.microsoft.com/download/5/0/5/505646ED-5EDF-4E23-8E84-6119E4BF82E0/Mitigating_Software_Vulnerabilities.pdf)