The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-12773 | The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code. |
Solution
PTC has released the following resolutions: Update the impacted product to the latest version: · ThingWorx Edge C-SDK: 3.0.0 or later. · ThingWorx Edge MicroServer (EMS): v5.4.11 or later. · .NET-SDK: v5.8.5 or later. For Kepware products, the vulnerability is mitigated if the ThingWorx Interface is not enabled. To use the ThingWorx Interface without the vulnerability, update to the latest version of the product: · Kepware KEPServerEX: v6.13 or later. · ThingWorx Kepware Server (formerly ThingWorx Industrial Connectivity): v6.13 or later. · ThingWorx Kepware Edge: v1.6 or later. The following products should be upgraded as indicated or in accordance with the applicable organization’s recommendations if the ThingWorx Interface is in use: · Rockwell Automation KEPServer Enterprise: v6.13 or later. · GE Digital Industrial Gateway Server: v7.613 or later. For more information see PTC’s Customer Support Article .
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01 |
![]() ![]() |
Thu, 16 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-16T21:55:52.537Z
Reserved: 2023-02-08T20:21:34.258Z
Link: CVE-2023-0755

Updated: 2024-08-02T05:24:34.155Z

Status : Modified
Published: 2023-02-23T22:15:11.427
Modified: 2024-11-21T07:37:45.493
Link: CVE-2023-0755

No data.

No data.