KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.
No analysis available yet.
Vendor Solution
PTC has released and recommends users to update to the following versions: * KEPServerEX should upgrade to v6.15 or later * ThingWorx Kepware Server should upgrade to v6.15 or later * ThingWorx Industrial Connectivity should upgrade to ThingWorx Kepware Server v6.15 or later * OPC-Aggregator should upgrade to v6.15 or later * ThingWorx Kepware Edge: Upgrade to v1.8 or later Refer to secure configuration guide here https://www.ptc.com/en/support/refdoc/ThingWorx_Kepware_Server/6.15/ThingWorx%20Kepware%20Server%20Secure%20Deployment%20Guide If additional questions remain, please contact PTC Technical Support https://support.ptc.com/apps/case_logger_viewer/cs/auth/ssl/log For more information, see PTC's advisory https://www.ptc.com/en/support/article/CS405439 .
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58181 | KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information. |
No history.
Subscriptions
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-02T08:14:24.586Z
Reserved: 2023-11-01T16:18:42.353Z
Link: CVE-2023-5908
No data.
Status : Modified
Published: 2023-11-30T22:15:09.923
Modified: 2024-11-21T08:42:45.123
Link: CVE-2023-5908
No data.
OpenCVE Enrichment
No data.
EUVD