Description

The affected products are vulnerable to an integer
overflow or wraparound, which could  allow an attacker to crash the server and remotely
execute arbitrary code.















Published: 2023-02-23
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

PTC has released the following resolutions: Update the impacted product to the latest version: ·         ThingWorx Edge C-SDK: 3.0.0 or later. ·         ThingWorx Edge MicroServer (EMS): v5.4.11 or later. ·         .NET-SDK: v5.8.5 or later. For Kepware products, the vulnerability is mitigated if the ThingWorx Interface is not enabled. To use the ThingWorx Interface without the vulnerability, update to the latest version of the product: ·         Kepware KEPServerEX: v6.13 or later. ·         ThingWorx Kepware Server (formerly ThingWorx Industrial Connectivity): v6.13 or later. ·         ThingWorx Kepware Edge: v1.6 or later. The following products should be upgraded as indicated or in accordance with the applicable organization’s recommendations if the ThingWorx Interface is in use: ·         Rockwell Automation KEPServer Enterprise: v6.13 or later. ·         GE Digital Industrial Gateway Server: v7.613 or later. For more information see PTC’s Customer Support Article .

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-12772 The affected products are vulnerable to an integer overflow or wraparound, which could  allow an attacker to crash the server and remotely execute arbitrary code.
History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Ge Digital Industrial Gateway Server
Ptc Kepware Server Kepware Serverex Thingworx .net-sdk Thingworx Edge C-sdk Thingworx Edge Microserver Thingworx Industrial Connectivity Thingworx Kepware Edge
Rockwellautomation Kepserver Enterprise
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T21:55:46.607Z

Reserved: 2023-02-08T20:15:58.394Z

Link: CVE-2023-0754

cve-icon Vulnrichment

Updated: 2024-08-02T05:24:34.053Z

cve-icon NVD

Status : Modified

Published: 2023-02-23T22:15:11.333

Modified: 2024-11-21T07:37:45.373

Link: CVE-2023-0754

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses