{"id":1236,"date":"2022-11-17T09:56:16","date_gmt":"2022-11-17T09:56:16","guid":{"rendered":"https:\/\/integrationobjects.com\/blog\/?p=1236"},"modified":"2026-04-03T16:04:39","modified_gmt":"2026-04-03T16:04:39","slug":"windows-dcom-server-security-feature-bypass","status":"publish","type":"post","link":"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/","title":{"rendered":"DCOM Server Security Feature Bypass (CVE-2021-26414): What OPC Users Need to Know"},"content":{"rendered":"<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">If you run OPC Classic applications in your industrial environment, Microsoft&#8217;s DCOM server security hardening update is one of the most operationally significant Windows changes in recent years. Since March 2023, it has been permanently enforced with no way to roll it back &#8211; meaning any OPC Classic setup that hasn&#8217;t adapted is either broken or running with a workaround that introduces its own risk.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">This article explains what the DCOM server security change is, which OPC systems it affects, how to check if your environment is impacted, and what your options are for maintaining secure, uninterrupted OPC communication.<\/p>\n<h2>What is DCOM server security and why does it matter for OPC?<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">DCOM (Distributed Component Object Model) is the Microsoft protocol that OPC Classic &#8211; including OPC DA, OPC HDA, and OPC AE &#8211; has relied on since its inception for remote communication between OPC clients and servers. DCOM handles the remote procedure calls that allow an OPC client on one machine to read data from an OPC server on another.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The problem is that DCOM was designed in the 1990s for closed, trusted networks. As industrial environments became more interconnected, and as attackers became more sophisticated, DCOM&#8217;s security model became a liability. Microsoft identified a specific vulnerability, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26414\">CVE-2021-26414<\/a>, which allowed attackers to bypass DCOM server security authentication, potentially gaining unauthorized access to systems communicating over DCOM.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The fix was a mandatory hardening update that raises the minimum authentication level required for all DCOM connections. This is the right security decision, but it breaks any OPC Classic client application that doesn&#8217;t support the new Packet Level Integrity requirement.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">The Microsoft DCOM hardening rollout timeline<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Microsoft released the DCOM server security hardening update (<a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5004442-manage-changes-for-windows-dcom-server-security-feature-bypass-cve-2021-26414-f1400b52-c141-43d2-941e-37ed901c769c\">KB5004442<\/a>) in stages to give organizations time to adapt:<\/p>\n<table style=\"height: 319px;\" width=\"902\" data-tablestyle=\"MsoTable15Grid4Accent1\" data-tablelook=\"1184\" aria-rowcount=\"4\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"4369\">\n<p style=\"text-align: left;\"><b><span data-contrast=\"none\">Update release<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/p>\n<\/td>\n<td data-celllook=\"4369\"><b><span data-contrast=\"none\">Behavior change<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"0\"><b><span data-contrast=\"none\">June 8, 2021<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\">\n<p style=\"text-align: left;\"><span data-contrast=\"none\">Hardening changes disabled by default but with the ability to enable them using a registry key.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/p>\n<\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"0\"><b><span data-contrast=\"none\">June 14, 2022<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Hardening changes enabled by default but with the ability to disable them\u202fusing a registry key.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"0\"><b><span data-contrast=\"none\">March 14, 2023<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Hardening changes enabled by default with no ability to disable them. By this point, you must resolve\u202fany compatibility issues with the hardening changes and applications in your environment.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>As of March 2023, there is no registry key, no group policy, and no workaround that disables this enforcement. Every Windows machine that receives standard updates is now running with DCOM hardening active.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Which OPC systems are affected?<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The DCOM server security hardening update affects the <strong>OPC client side<\/strong> of any remote OPC Classic connection. Specifically, when the Windows update is applied to the machine running the OPC server, any OPC client connecting to it remotely must support Packet Level Integrity &#8211; the elevated authentication level Microsoft now requires.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">You are affected if:<\/p>\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\">You use OPC Classic (DA, HDA, or AE) for remote communications between machines<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Your OPC client application was built before the hardening requirement and has not been updated to support Packet Level Integrity<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Your OPC client is part of a larger OT system such as a SCADA or DCS platform where the vendor has not yet released a compatible update, or where updating the software in a production environment is not immediately feasible<\/li>\n<\/ul>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">You are not affected if:<\/p>\n<ul class=\"[li_&amp;]:mb-0 [li_&amp;]:mt-1 [li_&amp;]:gap-1 [&amp;:not(:last-child)_ul]:pb-1 [&amp;:not(:last-child)_ol]:pb-1 list-disc flex flex-col gap-1 pl-8 mb-3\">\n<li class=\"whitespace-normal break-words pl-2\">All your OPC Classic communication is local (client and server on the same machine)<\/li>\n<li class=\"whitespace-normal break-words pl-2\">You have already migrated to OPC UA, which uses its own security model independent of DCOM<\/li>\n<li class=\"whitespace-normal break-words pl-2\">Your OPC client vendor has already released an update that supports Packet Level Integrity and you have deployed it<\/li>\n<\/ul>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">How to check if your environment is impacted<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Before choosing a remediation path, confirm whether your systems are affected:<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Step 1: Check the Windows update status on your OPC server machine.<\/strong> Open Windows Update history and confirm whether KB5004442 or any cumulative update from June 2022 onwards has been applied. On fully patched Windows systems from March 2023 onwards, hardening is active.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Step 2: Test your OPC client connections.<\/strong> After confirming the server machine is patched, attempt to connect your OPC client to the remote OPC server. If the connection fails with an access denied or authentication error that wasn&#8217;t present before, the hardening update is likely the cause.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Step 3: Check the Windows Event Log.<\/strong> On both the client and server machines, look in the System event log for DCOM-related errors (Event ID 10036 is commonly associated with DCOM authentication failures following this update).<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Step 4: Consult your OPC client vendor.<\/strong> Ask your OPC client software vendor whether their product supports DCOM Packet Level Integrity. If they have released an updated version, that is the first remediation option to evaluate.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">What happens if you don&#8217;t address DCOM server security hardening?<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Ignoring the DCOM server security update is not a safe option, for two reasons.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">First, the registry workaround that previously allowed organizations to disable hardening has been removed since March 2023. There is no longer a supported way to revert to pre-hardening DCOM behavior on a patched Windows system.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Second, CVE-2021-26414 is a real vulnerability. Running with weakened DCOM authentication in an environment that is increasingly connected as IT\/OT integration accelerates creates a genuine attack surface. Industrial systems that communicate via DCOM across network boundaries are particularly exposed.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The correct response is to either update your OPC client software to support Packet Level Integrity, or to eliminate DCOM from your OPC communication architecture entirely.<\/p>\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Solutions for maintaining OPC communication after DCOM hardening<\/h2>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">There are two proven approaches for keeping OPC Classic communication working securely after the Microsoft DCOM server security update without waiting for your OPC client vendor to release an update.<\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Arial,Times New Roman\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">\n<h3>Option 1: OPC tunneling with OPCNet Broker\u00ae<\/h3>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/integrationobjects.com\/sioth-opc\/sioth-opc-tunneling\/opcnet-broker-da-hda-ae\/\">OPCNet Broker\u00ae<\/a> replaces DCOM entirely as the transport layer for OPC Classic communication. Instead of relying on DCOM for remote connections, it encapsulates OPC DA, HDA, and AE traffic inside a standard TCP connection using a single configurable port.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">This approach works regardless of your OPC client&#8217;s DCOM support level, because the OPC client connects locally to OPCNet Broker\u00ae on the same machine &#8211; a local connection that is not subject to the remote DCOM hardening requirement. OPCNet Broker\u00ae then handles the secure remote communication to the OPC server side.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>The result:<\/strong> you can apply the Windows DCOM server security update fully, keep your existing OPC client and server software at their current versions, and maintain continuous, secure OPC communication without touching the client application code.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Additional security capabilities OPCNet Broker\u00ae provides beyond DCOM elimination: data encryption without certificates, user authentication, IP whitelisting, and tag-level access control down to browse, read, and write permissions per user.<\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:288}\"> <img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1237 aligncenter\" src=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/OPCNet-Broker.png\" alt=\"OPCNet Broker as an alternative and secure solution\" width=\"572\" height=\"382\" srcset=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/OPCNet-Broker.png 849w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/OPCNet-Broker-300x200.png 300w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/OPCNet-Broker-768x513.png 768w\" sizes=\"auto, (max-width: 572px) 100vw, 572px\" \/><\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:288}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This solution will allow you to implement the <\/span><b><span data-contrast=\"none\">Windows DCOM update<\/span><\/b><span data-contrast=\"none\"> while using your existing software versions for the OPC Server and Client components.<a id=\"download\" class=\"btn_product_download\" href=\"https:\/\/integrationobjects.com\/sioth-opc\/sioth-opc-tunneling\/opcnet-broker-da-hda-ae\/\" target=\"_blank\" rel=\"noopener\">Download OPCNet Broker<\/a><\/span><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:288}\"><br \/>\n<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Arial,Times New Roman\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">\n<h3>Option 2: Migration to OPC UA with OPC UA Wrapper<\/h3>\n<\/li>\n<\/ol>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Many OPC client vendors have responded to the DCOM problem by adding OPC UA support to their products. OPC UA uses its own transport and security model &#8211; TLS encryption, X.509 certificates, and application-level authentication &#8211; which is entirely independent of DCOM. Migrating your client-server communication to OPC UA sidesteps the DCOM server security issue permanently.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">The challenge is that most existing OPC server installations still run OPC Classic only. The <a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/integrationobjects.com\/sioth-opc\/sioth-opc-unified-architecture\/opc-ua-wrapper\/\">OPC UA Wrapper<\/a> bridges this gap: it sits alongside your existing OPC Classic server and exposes its data as a standards-compliant OPC UA server. Your OPC UA-capable client connects to the wrapper over OPC UA, while the wrapper communicates locally with the Classic server \u2014 keeping DCOM off the network entirely.<\/p>\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">This is the right path if you are planning a broader migration toward OPC UA and want to move your security architecture forward at the same time.<\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:288}\"> <img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1238 aligncenter\" src=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/OPC-UA-Wrapper.png\" alt=\"\" width=\"665\" height=\"505\" srcset=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/OPC-UA-Wrapper.png 793w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/OPC-UA-Wrapper-300x228.png 300w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/OPC-UA-Wrapper-768x583.png 768w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:288}\">\u00a0<a id=\"download\" class=\"btn_product_download\" href=\"https:\/\/integrationobjects.com\/sioth-opc\/sioth-opc-unified-architecture\/opc-ua-wrapper\/\" target=\"_blank\" rel=\"noopener\">Download OPC UA Wrapper<\/a><\/span><\/p>\n<h2><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:288}\"> <span class=\"TextRun SCXW224776807 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW224776807 BCX0\" data-ccp-parastyle=\"heading 2\">Frequently asked questions about DCOM server security and OPC<\/span><\/span><span class=\"EOP SCXW224776807 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/span><\/h2>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:2,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559739&quot;:120,&quot;335559740&quot;:288}\"> <style>#sp-ea-1798 .spcollapsing { height: 0; overflow: hidden; transition-property: height;transition-duration: 300ms;}#sp-ea-1798.sp-easy-accordion>.sp-ea-single {margin-bottom: 10px; border: 1px solid #e2e2e2; }#sp-ea-1798.sp-easy-accordion>.sp-ea-single>.ea-header a {color: #444;}#sp-ea-1798.sp-easy-accordion>.sp-ea-single>.sp-collapse>.ea-body {background: #fff; color: #444;}#sp-ea-1798.sp-easy-accordion>.sp-ea-single {background: #eee;}#sp-ea-1798.sp-easy-accordion>.sp-ea-single>.ea-header a .ea-expand-icon { float: left; color: #444;font-size: 16px;}.sp-easy-accordion .sp-ea-single .ea-header a{\r\n  display: block;\r\n    text-decoration: none;\r\n    cursor: pointer;\r\n    font-weight: 600;\r\n    color: #444;\r\n    font-size: 16px;\r\n    line-height: 1;\r\n  box-shadow: none;}<\/style><div id=\"sp_easy_accordion-1775231746\"><div id=\"sp-ea-1798\" class=\"sp-ea-one sp-easy-accordion\" data-ea-active=\"ea-click\" data-ea-mode=\"vertical\" data-preloader=\"\" data-scroll-active-item=\"\" data-offset-to-scroll=\"0\"><div class=\"ea-card ea-expand sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17980\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17980\" aria-controls=\"collapse17980\" href=\"#\" aria-expanded=\"true\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-minus\"><\/i> What is the Windows DCOM server security feature bypass vulnerability? <\/a><\/h3><div class=\"sp-collapse spcollapse collapsed show\" id=\"collapse17980\" data-parent=\"#sp-ea-1798\" role=\"region\" aria-labelledby=\"ea-header-17980\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW4305340 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW4305340 BCX0\">CVE-2021-26414 is a vulnerability in Windows DCOM that allowed attackers to bypass authentication when connecting to a DCOM server remotely. Microsoft addressed it by enforcing Packet Level Integrity as the\u00a0<\/span><span class=\"NormalTextRun SCXW4305340 BCX0\">minimum<\/span><span class=\"NormalTextRun SCXW4305340 BCX0\">\u00a0authentication level for all DCOM connections, rolled out through update KB5004442 between June 2021 and March 2023.<\/span><\/span><span class=\"EOP SCXW4305340 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17981\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17981\" aria-controls=\"collapse17981\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> Is the DCOM hardening update still reversible? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17981\" data-parent=\"#sp-ea-1798\" role=\"region\" aria-labelledby=\"ea-header-17981\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW163579060 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW163579060 BCX0\">No. Since March 14, 2023, the DCOM server security hardening has been permanently enforced on all patched Windows systems. The registry key that previously allowed organizations to disable it has been removed. There is no supported way to revert to pre-hardening DCOM behavior.<\/span><\/span><span class=\"EOP SCXW163579060 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17982\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17982\" aria-controls=\"collapse17982\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> Why does the DCOM update break OPC Classic connections? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17982\" data-parent=\"#sp-ea-1798\" role=\"region\" aria-labelledby=\"ea-header-17982\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW226614800 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW226614800 BCX0\">OPC Classic uses DCOM for all remote communications. The hardening update requires a higher authentication level - Packet Level Integrity - than many older OPC client applications were built to support. When the OPC server machine is patched and the OPC client\u00a0<\/span><span class=\"NormalTextRun SCXW226614800 BCX0\">doesn't<\/span><span class=\"NormalTextRun SCXW226614800 BCX0\">\u00a0meet the new requirement, the remote connection is rejected.<\/span><\/span><span class=\"EOP SCXW226614800 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17983\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17983\" aria-controls=\"collapse17983\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> Do I need to update my OPC server software to fix this? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17983\" data-parent=\"#sp-ea-1798\" role=\"region\" aria-labelledby=\"ea-header-17983\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW259199626 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW259199626 BCX0\">Not necessarily. The update affects the OPC client's ability to connect to a patched OPC server machine. Solutions like\u00a0<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW259199626 BCX0\">OPCNet<\/span><span class=\"NormalTextRun SCXW259199626 BCX0\">\u00a0Broker\u00ae work at the transport layer and allow you to keep your existing OPC server software unchanged while eliminating DCOM from remote communications.<\/span><\/span><span class=\"EOP SCXW259199626 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17984\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17984\" aria-controls=\"collapse17984\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> What is the difference between OPCNet Broker\u00ae and the OPC UA Wrapper for this use case? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17984\" data-parent=\"#sp-ea-1798\" role=\"region\" aria-labelledby=\"ea-header-17984\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW84331002 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW84331002 BCX0\">OPCNet<\/span><span class=\"NormalTextRun SCXW84331002 BCX0\">\u00a0Broker\u00ae keeps your entire OPC Classic architecture intact and replaces only the DCOM transport with a secure TCP tunnel\u00a0<\/span><span class=\"NormalTextRun SCXW84331002 BCX0\">-<\/span><span class=\"NormalTextRun SCXW84331002 BCX0\">\u00a0no software changes on the client or server are needed. The OPC UA Wrapper converts your OPC Classic server into an OPC UA server, which is the better choice if your OPC client already supports OPC UA or if you are planning a migration toward OPC UA.<\/span><\/span><span class=\"EOP SCXW84331002 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:279}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17985\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17985\" aria-controls=\"collapse17985\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> Does OPC UA have the same DCOM security problems? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17985\" data-parent=\"#sp-ea-1798\" role=\"region\" aria-labelledby=\"ea-header-17985\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW212522275 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW212522275 BCX0\">No. OPC UA was designed with security built in from the ground up. It uses its own transport stack\u00a0<\/span><span class=\"NormalTextRun SCXW212522275 BCX0\">-<\/span><span class=\"NormalTextRun SCXW212522275 BCX0\">\u00a0typically TCP with TLS encryption\u00a0<\/span><span class=\"NormalTextRun SCXW212522275 BCX0\">-<\/span><span class=\"NormalTextRun SCXW212522275 BCX0\">\u00a0and does not use DCOM at all. Migrating from OPC Classic to OPC UA permanently\u00a0<\/span><span class=\"NormalTextRun SCXW212522275 BCX0\">eliminates<\/span><span class=\"NormalTextRun SCXW212522275 BCX0\">\u00a0DCOM-related vulnerabilities.<\/span><\/span><span class=\"EOP SCXW212522275 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-17986\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse17986\" aria-controls=\"collapse17986\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> What event ID should I look for in Windows logs to diagnose a DCOM authentication failure? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse17986\" data-parent=\"#sp-ea-1798\" role=\"region\" aria-labelledby=\"ea-header-17986\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW152028540 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW152028540 BCX0\">Event ID 10036 in the System event log on the OPC server machine is commonly generated when a DCOM connection is rejected due to insufficient authentication level following the KB5004442 hardening update.<\/span><\/span><span class=\"EOP SCXW152028540 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><script type=\"application\/ld+json\">{ \"@context\": \"https:\/\/schema.org\", \"@type\": \"FAQPage\", \"@id\": \"sp-ea-schema-1798-69d04e217b297\", \"mainEntity\": [{ \"@type\": \"Question\", \"name\": \"What is the Windows DCOM server security feature bypass vulnerability? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"CVE-2021-26414 is a vulnerability in Windows DCOM that allowed attackers to bypass authentication when connecting to a DCOM server remotely. Microsoft addressed it by enforcing Packet Level Integrity as the\u00a0minimum\u00a0authentication level for all DCOM connections, rolled out through update KB5004442 between June 2021 and March 2023.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"Is the DCOM hardening update still reversible? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"No. Since March 14, 2023, the DCOM server security hardening has been permanently enforced on all patched Windows systems. The registry key that previously allowed organizations to disable it has been removed. There is no supported way to revert to pre-hardening DCOM behavior.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"Why does the DCOM update break OPC Classic connections? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"OPC Classic uses DCOM for all remote communications. The hardening update requires a higher authentication level - Packet Level Integrity - than many older OPC client applications were built to support. When the OPC server machine is patched and the OPC client\u00a0doesn't\u00a0meet the new requirement, the remote connection is rejected.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"Do I need to update my OPC server software to fix this? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"Not necessarily. The update affects the OPC client's ability to connect to a patched OPC server machine. Solutions like\u00a0OPCNet\u00a0Broker\u00ae work at the transport layer and allow you to keep your existing OPC server software unchanged while eliminating DCOM from remote communications.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"What is the difference between OPCNet Broker\u00ae and the OPC UA Wrapper for this use case? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"OPCNet\u00a0Broker\u00ae keeps your entire OPC Classic architecture intact and replaces only the DCOM transport with a secure TCP tunnel\u00a0-\u00a0no software changes on the client or server are needed. The OPC UA Wrapper converts your OPC Classic server into an OPC UA server, which is the better choice if your OPC client already supports OPC UA or if you are planning a migration toward OPC UA.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"Does OPC UA have the same DCOM security problems? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"No. OPC UA was designed with security built in from the ground up. It uses its own transport stack\u00a0-\u00a0typically TCP with TLS encryption\u00a0-\u00a0and does not use DCOM at all. Migrating from OPC Classic to OPC UA permanently\u00a0eliminates\u00a0DCOM-related vulnerabilities.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"What event ID should I look for in Windows logs to diagnose a DCOM authentication failure? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"Event ID 10036 in the System event log on the OPC server machine is commonly generated when a DCOM connection is rejected due to insufficient authentication level following the KB5004442 hardening update.\u00a0\" } }] }<\/script><\/div><\/div><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you run OPC Classic applications in your industrial environment, Microsoft&#8217;s DCOM server security hardening update is one of the most operationally significant Windows changes<\/p>\n","protected":false},"author":1,"featured_media":1241,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185],"tags":[50,49],"class_list":["post-1236","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-opc-tunneling","tag-opc-ua-wrapper","tag-opcnet-broker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DCOM Server Security: CVE-2021-26414 Impact &amp; Fix for OPC<\/title>\n<meta name=\"description\" content=\"Microsoft&#039;s DCOM server security hardening (CVE-2021-26414) breaks OPC Classic connections. Understand the impact and how to keep your OPC systems running securely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DCOM Server Security: CVE-2021-26414 Impact &amp; Fix for OPC\" \/>\n<meta property=\"og:description\" content=\"Microsoft&#039;s DCOM server security hardening (CVE-2021-26414) breaks OPC Classic connections. Understand the impact and how to keep your OPC systems running securely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/\" \/>\n<meta property=\"og:site_name\" content=\"OPC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Integration.Objects.OPC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-17T09:56:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T16:04:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/MicrosoftTeams-image-17.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3042\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"OPCBlogAdmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IntegObjects\" \/>\n<meta name=\"twitter:site\" content=\"@IntegObjects\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"OPCBlogAdmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DCOM Server Security: CVE-2021-26414 Impact & Fix for OPC","description":"Microsoft's DCOM server security hardening (CVE-2021-26414) breaks OPC Classic connections. Understand the impact and how to keep your OPC systems running securely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/","og_locale":"en_US","og_type":"article","og_title":"DCOM Server Security: CVE-2021-26414 Impact & Fix for OPC","og_description":"Microsoft's DCOM server security hardening (CVE-2021-26414) breaks OPC Classic connections. Understand the impact and how to keep your OPC systems running securely.","og_url":"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/","og_site_name":"OPC Blog","article_publisher":"https:\/\/www.facebook.com\/Integration.Objects.OPC\/","article_published_time":"2022-11-17T09:56:16+00:00","article_modified_time":"2026-04-03T16:04:39+00:00","og_image":[{"width":3042,"height":1709,"url":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/MicrosoftTeams-image-17.png","type":"image\/png"}],"author":"OPCBlogAdmin","twitter_card":"summary_large_image","twitter_creator":"@IntegObjects","twitter_site":"@IntegObjects","twitter_misc":{"Written by":"OPCBlogAdmin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/","url":"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/","name":"DCOM Server Security: CVE-2021-26414 Impact & Fix for OPC","isPartOf":{"@id":"https:\/\/integrationobjects.com\/blog-\/#website"},"primaryImageOfPage":{"@id":"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/#primaryimage"},"image":{"@id":"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/#primaryimage"},"thumbnailUrl":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/MicrosoftTeams-image-17.png","datePublished":"2022-11-17T09:56:16+00:00","dateModified":"2026-04-03T16:04:39+00:00","author":{"@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/6efbaf488a07e418b93ff77f00af386b"},"description":"Microsoft's DCOM server security hardening (CVE-2021-26414) breaks OPC Classic connections. Understand the impact and how to keep your OPC systems running securely.","breadcrumb":{"@id":"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/#primaryimage","url":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/MicrosoftTeams-image-17.png","contentUrl":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2022\/11\/MicrosoftTeams-image-17.png","width":3042,"height":1709,"caption":"DCOM Server Security"},{"@type":"BreadcrumbList","@id":"https:\/\/integrationobjects.com\/blog\/windows-dcom-server-security-feature-bypass\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integrationobjects.com\/blog-\/"},{"@type":"ListItem","position":2,"name":"DCOM Server Security Feature Bypass (CVE-2021-26414): What OPC Users Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/integrationobjects.com\/blog-\/#website","url":"https:\/\/integrationobjects.com\/blog-\/","name":"OPC Blog","description":"OPC and related technologies news from Integration Objects","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integrationobjects.com\/blog-\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/6efbaf488a07e418b93ff77f00af386b","name":"OPCBlogAdmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f2d787c3c48eb147d5b4d0c9d05c6f35a5946c7dc40af2eedbe64030e99ea299?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2d787c3c48eb147d5b4d0c9d05c6f35a5946c7dc40af2eedbe64030e99ea299?s=96&d=mm&r=g","caption":"OPCBlogAdmin"}}]}},"_links":{"self":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/1236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/comments?post=1236"}],"version-history":[{"count":12,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/1236\/revisions"}],"predecessor-version":[{"id":1257,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/1236\/revisions\/1257"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/media\/1241"}],"wp:attachment":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/media?parent=1236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/categories?post=1236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/tags?post=1236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}