KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.




Project Subscriptions

Vendors Products
Industrial Gateway Server Subscribe
Keepserverex Subscribe
Opc-aggregator Subscribe
Thingworx Industrial Connectivity Subscribe
Thingworx Kepware Edge Subscribe
Thingworx Kepware Server Subscribe
Rockwellautomation Subscribe
Kepserver Enterprise Subscribe
Softwaretoolbox Subscribe
Top Server Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-58181 KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.
Fixes

Solution

PTC has released and recommends users to update to the following versions: * KEPServerEX should upgrade to v6.15 or later * ThingWorx Kepware Server should upgrade to v6.15 or later * ThingWorx Industrial Connectivity should upgrade to ThingWorx Kepware Server v6.15 or later * OPC-Aggregator should upgrade to v6.15 or later * ThingWorx Kepware Edge: Upgrade to v1.8 or later Refer to secure configuration guide here https://www.ptc.com/en/support/refdoc/ThingWorx_Kepware_Server/6.15/ThingWorx%20Kepware%20Server%20Secure%20Deployment%20Guide If additional questions remain, please contact PTC Technical Support https://support.ptc.com/apps/case_logger_viewer/cs/auth/ssl/log For more information, see PTC's advisory https://www.ptc.com/en/support/article/CS405439 .


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-02T08:14:24.586Z

Reserved: 2023-11-01T16:18:42.353Z

Link: CVE-2023-5908

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-30T22:15:09.923

Modified: 2024-11-21T08:42:45.123

Link: CVE-2023-5908

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses