Multiple vulnerabilities in PTC Kepware KepServerEX and ThingWorx Kepware Server



Published: 2023-09-01
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2023-29444
CVE-2023-29445
CVE-2023-29446
CVE-2023-29447
CWE-ID CWE-427
CWE-22
CWE-522
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
ThingWorx Kepware Server
Server applications / Other server solutions

Kepware KepServerEX
Server applications / Other server solutions

Vendor PTC

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Insecure DLL loading

EUVDB-ID: #VU80223

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-29444

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to the application loads DLL libraries in an insecure manner. A local administrator can place a specially crafted .dll file and execute arbitrary code on victim's system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ThingWorx Kepware Server: 6.14.263.0

Kepware KepServerEX: 6.14.263.0

Fixed software versions

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-243-03
http://www.ptc.com/en/support/article/cs399528


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Insecure DLL loading

EUVDB-ID: #VU80224

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-29445

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to the application loads DLL libraries in an insecure manner. A local administrator can place a specially crafted .dll file and gain elevated privileges on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ThingWorx Kepware Server: 6.14.263.0

Kepware KepServerEX: 6.14.263.0

Fixed software versions

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-243-03
http://www.ptc.com/en/support/article/cs399528


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Path traversal

EUVDB-ID: #VU80225

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-29446

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote attacker can trick a victim to load a specially crafted project file and read arbitrary files on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Kepware KepServerEX: 6.14.263.0

ThingWorx Kepware Server: 6.14.263.0

Fixed software versions

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-243-03
http://www.ptc.com/en/support/article/cs399528


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Insufficiently protected credentials

EUVDB-ID: #VU80226

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-29447

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to insufficiently protected credentials. A remote attacker on the local network can perform a man-in-the-middle (MitM) attack via ARP spoofing and obtain the web server's plaintext credentials.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ThingWorx Kepware Server: 6.14.263.0

Kepware KepServerEX: 6.14.263.0

Fixed software versions

CPE2.3 External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-243-03
http://www.ptc.com/en/support/article/cs399528


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###