CWE
129
Advisory Published
Updated

CVE-2023-0755: Out-of-bounds Read

First published: Thu Feb 23 2023(Updated: )

The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
Ge Digital Industrial Gateway Server<=7.612
Ptc Kepware Server<=6.12
Ptc Kepware Serverex<=6.12
Ptc Thingworx .net-sdk<=5.8.4.971
Ptc Thingworx Edge C-sdk<=2.2.12.1052
Ptc Thingworx Edge Microserver<=5.4.10.0
PTC ThingWorx Industrial Connectivity
Ptc Thingworx Kepware Edge<=1.5
Rockwellautomation Kepserver Enterprise<=6.12
PTC ThingWorx Edge C-SDK: v2.2.12.1052 or lower
PTC .NET-SDK: v5.8.4.971 or lower
PTC ThingWorx Edge MicroServer (EMS): v5.4.10.0 or lower
PTC KEPServerEX
PTC ThingWorx Kepware Server (formerly ThingWorx Industrial Connectivity): v6.12 or lower
PTC ThingWorx Industrial Connectivity
PTC ThingWorx Kepware Edge: v1.5 or lower
PTC Rockwell Automation KEPServer Enterprise: v6.12 or lower
PTC GE Digital Industrial Gateway Server: v7.612 or lower

Remedy

PTC has released the following resolutions: Update the impacted product to the latest version: ·         ThingWorx Edge C-SDK: 3.0.0 or later. ·         ThingWorx Edge MicroServer (EMS): v5.4.11 or later. ·         .NET-SDK: v5.8.5 or later. For Kepware products, the vulnerability is mitigated if the ThingWorx Interface is not enabled. To use the ThingWorx Interface without the vulnerability, update to the latest version of the product: ·         Kepware KEPServerEX: v6.13 or later. ·         ThingWorx Kepware Server (formerly ThingWorx Industrial Connectivity): v6.13 or later. ·         ThingWorx Kepware Edge: v1.6 or later. The following products should be upgraded as indicated or in accordance with the applicable organization’s recommendations if the ThingWorx Interface is in use: ·         Rockwell Automation KEPServer Enterprise: v6.13 or later. ·         GE Digital Industrial Gateway Server: v7.613 or later. For more information see PTC’s Customer Support Article .

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2023-0755?

    CVE-2023-0755 is a vulnerability that affects Ge Digital Industrial Gateway Server, Ptc Kepware Server, Ptc Kepware Serverex, Ptc Thingworx .net-sdk, Ptc Thingworx Edge C-sdk, Ptc Thingworx Edge Microserver, Ptc Thingworx Industrial Connectivity, Ptc Thingworx Kepware Edge, and Rockwellautomation Kepserver Enterprise. It allows an attacker to crash the server and remotely execute arbitrary code.

  • How severe is CVE-2023-0755?

    CVE-2023-0755 has a severity rating of 9.8 (critical).

  • How can an attacker exploit CVE-2023-0755?

    An attacker can exploit CVE-2023-0755 by sending specially crafted input to trigger an improper validation of array index, causing the server to crash and potentially execute arbitrary code.

  • What is the affected version of Ge Digital Industrial Gateway Server in CVE-2023-0755?

    The affected version of Ge Digital Industrial Gateway Server in CVE-2023-0755 is up to and including version 7.612.

  • How can I mitigate the vulnerability in CVE-2023-0755?

    To mitigate the vulnerability in CVE-2023-0755, it is recommended to apply the necessary security patches or updates provided by the vendor and follow their recommended mitigation steps.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203