First published: Wed Jan 13 2021(Updated: )
KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity (all versions), OPC-Aggregator (all versions), Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server v7.68.804 and v7.66, and Software Toolbox TOP Server all 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
PTC KEPServerEX: v6.0 to v6.9 | ||
PTC ThingWorx Kepware Server | =6.8 and v6.9 | |
PTC ThingWorx Industrial Connectivity | ||
PTC OPC-Aggregator | ||
Ge Industrial Gateway Server | =7.66 | |
Ge Industrial Gateway Server | =7.68.804 | |
PTC Kepware KEPServerEX | =6.0 | |
PTC Kepware KEPServerEX | =6.9 | |
PTC OPC-Aggregator | ||
PTC ThingWorx Industrial Connectivity | ||
PTC ThingWorx Kepware Server | =6.8 | |
PTC ThingWorx Kepware Server | =6.9 | |
Rockwellautomation Kepserver Enterprise | =6.6.504.0 | |
Rockwellautomation Kepserver Enterprise | =6.9.572.0 | |
Softwaretoolbox Top Server | >=6.0<=6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27267 is a vulnerability in KEPServerEX and related software that allows remote attackers to execute arbitrary code or cause a denial-of-service condition.
KEPServerEX versions 6.0 to 6.9, ThingWorx Kepware Server versions 6.8 and 6.9, ThingWorx Industrial Connectivity (all versions), OPC-Aggregator (all versions), Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server versions 7.66 and 7.68.804, and Software Toolbox TOP Server versions 6.x are affected.
CVE-2020-27267 has a severity rating of 9.1 (critical).
CVE-2020-27267 can be exploited by remote attackers who send specially crafted packets to the affected software, allowing them to execute arbitrary code or cause a denial-of-service condition.
Yes, patches and updates have been released by the relevant software vendors to address the CVE-2020-27267 vulnerability. It is recommended to update to the latest patched version of the affected software.