You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
On June 8, 2021, Microsoft released a security update that changed how the Windows
operating system enforces DCOM security. This Windows update was made in response
to a recently discovered vulnerability, detailed in CVE 2021 26414. As a result of this
change, OPC communications relying on DCOM may stop working when the Windows
changes start to be enforced in 2022.
[Update 5 KSM2022 001 - Experion OPC Classic Clients Microsoft Windows DCOM Security Update 2022 Changes.pdf]
Are you aware of this future Windows Update?
On June 8, 2021, Microsoft released a security update that changed how the Windows
operating system enforces DCOM security. This Windows update was made in response
to a recently discovered vulnerability, detailed in CVE 2021 26414. As a result of this
change, OPC communications relying on DCOM may stop working when the Windows
changes start to be enforced in 2022.
[Update 5 KSM2022 001 - Experion OPC Classic Clients Microsoft Windows DCOM Security Update 2022 Changes.pdf]
(https://github.com/ya-mouse/openopc/files/8451545/Update.5.KSM2022.001.-.Experion.OPC.Classic.Clients.Microsoft.Windows.DCOM.Security.Update.2022.Changes.pdf)
The text was updated successfully, but these errors were encountered: