The affected products are vulnerable to an integer
overflow or wraparound, which could allow an attacker to crash the server and remotely
execute arbitrary code.
Subscriptions
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-12772 | The affected products are vulnerable to an integer overflow or wraparound, which could allow an attacker to crash the server and remotely execute arbitrary code. |
Solution
PTC has released the following resolutions: Update the impacted product to the latest version: · ThingWorx Edge C-SDK: 3.0.0 or later. · ThingWorx Edge MicroServer (EMS): v5.4.11 or later. · .NET-SDK: v5.8.5 or later. For Kepware products, the vulnerability is mitigated if the ThingWorx Interface is not enabled. To use the ThingWorx Interface without the vulnerability, update to the latest version of the product: · Kepware KEPServerEX: v6.13 or later. · ThingWorx Kepware Server (formerly ThingWorx Industrial Connectivity): v6.13 or later. · ThingWorx Kepware Edge: v1.6 or later. The following products should be upgraded as indicated or in accordance with the applicable organization’s recommendations if the ThingWorx Interface is in use: · Rockwell Automation KEPServer Enterprise: v6.13 or later. · GE Digital Industrial Gateway Server: v7.613 or later. For more information see PTC’s Customer Support Article .
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01 |
|
Thu, 16 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:55:46.607Z
Reserved: 2023-02-08T20:15:58.394Z
Link: CVE-2023-0754
Updated: 2024-08-02T05:24:34.053Z
Status : Modified
Published: 2023-02-23T22:15:11.333
Modified: 2024-11-21T07:37:45.373
Link: CVE-2023-0754
No data.
OpenCVE Enrichment
No data.
EUVD