The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-12773 The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.
Fixes

Solution

PTC has released the following resolutions: Update the impacted product to the latest version: ·         ThingWorx Edge C-SDK: 3.0.0 or later. ·         ThingWorx Edge MicroServer (EMS): v5.4.11 or later. ·         .NET-SDK: v5.8.5 or later. For Kepware products, the vulnerability is mitigated if the ThingWorx Interface is not enabled. To use the ThingWorx Interface without the vulnerability, update to the latest version of the product: ·         Kepware KEPServerEX: v6.13 or later. ·         ThingWorx Kepware Server (formerly ThingWorx Industrial Connectivity): v6.13 or later. ·         ThingWorx Kepware Edge: v1.6 or later. The following products should be upgraded as indicated or in accordance with the applicable organization’s recommendations if the ThingWorx Interface is in use: ·         Rockwell Automation KEPServer Enterprise: v6.13 or later. ·         GE Digital Industrial Gateway Server: v7.613 or later. For more information see PTC’s Customer Support Article .


Workaround

No workaround given by the vendor.

History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T21:55:52.537Z

Reserved: 2023-02-08T20:21:34.258Z

Link: CVE-2023-0755

cve-icon Vulnrichment

Updated: 2024-08-02T05:24:34.155Z

cve-icon NVD

Status : Modified

Published: 2023-02-23T22:15:11.427

Modified: 2024-11-21T07:37:45.493

Link: CVE-2023-0755

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.