Multiple vulnerabilities in PTC KEPServerEX, ThingWorx and OPC-Aggregator



Published: 2023-12-04
Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2023-5908
CVE-2023-5909
CWE-ID CWE-122
CWE-297
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Kepware KepServerEX
Server applications / Other server solutions

ThingWorx Kepware Server
Server applications / Other server solutions

ThingWorx Industrial Connectivity
Server applications / Other server solutions

ThingWorx Kepware Edge
Server applications / Other server solutions

OPC Aggregator
Server applications / Other server solutions

Vendor PTC

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Heap-based buffer overflow

EUVDB-ID: #VU83635

Risk: High

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-5908

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a boundary error. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and perform a denial of service (DoS) attack or leak information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Kepware KepServerEX: 6.14.263.0

ThingWorx Kepware Server: 6.14.263.0

ThingWorx Industrial Connectivity: All versions

ThingWorx Kepware Edge: 1.7

OPC Aggregator: 6.14

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-334-03
http://www.ptc.com/en/support/article/CS405439


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper validation of certificate with host mismatch

EUVDB-ID: #VU83637

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-5909

CWE-ID: CWE-297 - Improper Validation of Certificate with Host Mismatch

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected application does not properly validate certificates from clients. A remote attacker can connect to the application and gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Kepware KepServerEX: 6.14.263.0

ThingWorx Kepware Server: 6.14.263.0

ThingWorx Industrial Connectivity: All versions

ThingWorx Kepware Edge: 1.7

OPC Aggregator: 6.14

External links

http://www.cisa.gov/news-events/ics-advisories/icsa-23-334-03
http://www.ptc.com/en/support/article/CS405439


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###