First published: Thu Feb 23 2023(Updated: )
The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Ge Digital Industrial Gateway Server | <=7.612 | |
Ptc Kepware Server | <=6.12 | |
Ptc Kepware Serverex | <=6.12 | |
Ptc Thingworx .net-sdk | <=5.8.4.971 | |
Ptc Thingworx Edge C-sdk | <=2.2.12.1052 | |
Ptc Thingworx Edge Microserver | <=5.4.10.0 | |
PTC ThingWorx Industrial Connectivity | ||
Ptc Thingworx Kepware Edge | <=1.5 | |
Rockwellautomation Kepserver Enterprise | <=6.12 | |
PTC ThingWorx Edge C-SDK: v2.2.12.1052 or lower | ||
PTC .NET-SDK: v5.8.4.971 or lower | ||
PTC ThingWorx Edge MicroServer (EMS): v5.4.10.0 or lower | ||
PTC KEPServerEX | ||
PTC ThingWorx Kepware Server (formerly ThingWorx Industrial Connectivity): v6.12 or lower | ||
PTC ThingWorx Industrial Connectivity | ||
PTC ThingWorx Kepware Edge: v1.5 or lower | ||
PTC Rockwell Automation KEPServer Enterprise: v6.12 or lower | ||
PTC GE Digital Industrial Gateway Server: v7.612 or lower |
PTC has released the following resolutions: Update the impacted product to the latest version: · ThingWorx Edge C-SDK: 3.0.0 or later. · ThingWorx Edge MicroServer (EMS): v5.4.11 or later. · .NET-SDK: v5.8.5 or later. For Kepware products, the vulnerability is mitigated if the ThingWorx Interface is not enabled. To use the ThingWorx Interface without the vulnerability, update to the latest version of the product: · Kepware KEPServerEX: v6.13 or later. · ThingWorx Kepware Server (formerly ThingWorx Industrial Connectivity): v6.13 or later. · ThingWorx Kepware Edge: v1.6 or later. The following products should be upgraded as indicated or in accordance with the applicable organization’s recommendations if the ThingWorx Interface is in use: · Rockwell Automation KEPServer Enterprise: v6.13 or later. · GE Digital Industrial Gateway Server: v7.613 or later. For more information see PTC’s Customer Support Article .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0755 is a vulnerability that affects Ge Digital Industrial Gateway Server, Ptc Kepware Server, Ptc Kepware Serverex, Ptc Thingworx .net-sdk, Ptc Thingworx Edge C-sdk, Ptc Thingworx Edge Microserver, Ptc Thingworx Industrial Connectivity, Ptc Thingworx Kepware Edge, and Rockwellautomation Kepserver Enterprise. It allows an attacker to crash the server and remotely execute arbitrary code.
CVE-2023-0755 has a severity rating of 9.8 (critical).
An attacker can exploit CVE-2023-0755 by sending specially crafted input to trigger an improper validation of array index, causing the server to crash and potentially execute arbitrary code.
The affected version of Ge Digital Industrial Gateway Server in CVE-2023-0755 is up to and including version 7.612.
To mitigate the vulnerability in CVE-2023-0755, it is recommended to apply the necessary security patches or updates provided by the vendor and follow their recommended mitigation steps.