Description
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16486.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-35082 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16486. |
References
History
Tue, 18 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Ge
Subscribe
Industrial Gateway Server
Subscribe
Ptc
Subscribe
Kepware Kepserverex
Subscribe
Opc-aggregator
Subscribe
Thingworx Industrial Connectivity
Subscribe
Thingworx Kepware Edge
Subscribe
Thingworx Kepware Server
Subscribe
Rockwellautomation
Subscribe
Kepserver Enterprise
Subscribe
Softwaretoolbox
Subscribe
Top Server
Subscribe
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-02-18T16:42:21.939Z
Reserved: 2022-08-16T00:00:00.000Z
Link: CVE-2022-2848
Updated: 2024-08-03T00:52:58.526Z
Status : Modified
Published: 2023-03-29T19:15:11.680
Modified: 2025-02-18T17:15:13.367
Link: CVE-2022-2848
No data.
OpenCVE Enrichment
No data.
EUVD