Article - CS405439
Security vulnerabilities identified in PTC Kepware products - November 2023
Modified: 07-Nov-2024
Applies To
- KEPServerEX 6.0.2107.0 to 6.14
- ThingWorx Kepware Server 8.0 to 6.14
- TOP Server 6.0.2107.0 to 6.14
- KEPServerEnterprise 5.19.476.0 to 6.14
- ThingWorx Kepware Edge 1.1 to 1.7
- GE Industrial Gateway Server 7.521 to 7.614
- ThingWorx Industrial Connectivity 8.0 to 8.5
- OPC Aggregator 6.2 to 6.14
Description
- CVSS 3.1 Score: 9.1 Critical
- CVSS 3.1 Vector String: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
- CWE: Heap-based buffer overflow CWE-122
- KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information
- Common Vulnerabilities and Exposures: CVE-2023-5908 has been assigned to this vulnerability
- Researcher Attribution: Researcher Shawn Hoffman reported these vulnerabilities to PTC
- CVSS 3.1 Score: 7.5 High
- CVSS 3.1 Vector String: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- CWE: Improper validation of certificate with host mismatch CWE-297
- KEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect
- Common Vulnerabilities and Exposures: CVE-2023-5909 has been assigned to this vulnerability
- Researcher Attribution: Researcher Shawn Hoffman reported these vulnerabilities to PTC
- Note that PTC has no indication nor has been made aware that any of these vulnerabilities have or are being exploited
This is a printer-friendly version of Article 405439 and may be out of date. For the latest version click CS405439