Article - CS405439

Security vulnerabilities identified in PTC Kepware products - November 2023

Modified: 01-Dec-2023   


Applies To

  • KEPServerEX 6.0.2107.0 to 6.14
  • ThingWorx Kepware Server 8.0 to 6.14
  • TOP Server 6.0.2107.0 to 6.14
  • KEPServerEnterprise 5.19.476.0 to 6.14
  • ThingWorx Kepware Edge 1.1 to 1.7
  • GE Industrial Gateway Server 7.521 to 7.614
  • ThingWorx Industrial Connectivity 8.0 to 8.5
  • OPC Aggregator 6.2 to 6.14 

Description

  • CVSS 3.1 Score: 9.1 Critical
  • CVSS 3.1 Vector String: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
  • CWE: Heap-based buffer overflow CWE-122
  • KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information
  • Common Vulnerabilities and Exposures: CVE-2023-5908 has been assigned to this vulnerability
  • Researcher Attribution: Researcher Shawn Hoffman reported these vulnerabilities to PTC
 
  • CVSS 3.1 Score: 7.5 High
  • CVSS 3.1 Vector String: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • CWE: Improper validation of certificate with host mismatch CWE-297
  • KEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect
  • Common Vulnerabilities and Exposures: CVE-2023-5909 has been assigned to this vulnerability
  • Researcher Attribution: Researcher Shawn Hoffman reported these vulnerabilities to PTC
 
  • Note that PTC has no indication nor has been made aware that any of these vulnerabilities have or are being exploited
This is a printer-friendly version of Article 405439 and may be out of date. For the latest version click CS405439