First published: Wed Jan 10 2024(Updated: )
An uncontrolled search path element vulnerability (DLL hijacking) has been discovered that could allow a locally authenticated adversary to escalate privileges to SYSTEM. Alternatively, they could host a trojanized version of the software and trick victims into downloading and installing their malicious version to gain initial access and code execution.
Credit: ot-cert@dragos.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ptc Kepware Server | >=6.0.2107.0<=6.14.263.0 | |
Ptc Kepware Server | >=6.8<=6.14.263.0 | |
PTC ThingWorx Industrial Connectivity | >=8.0<=8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29444 is classified as a high severity vulnerability due to its potential for privilege escalation.
To mitigate CVE-2023-29444, update affected software to versions that are not vulnerable, particularly ensuring that PTC KEPServerEX, ThingWorx Kepware Server, and ThingWorx Industrial Connectivity are updated.
CVE-2023-29444 affects PTC KEPServerEX, ThingWorx Kepware Server, and ThingWorx Industrial Connectivity in specific version ranges.
CVE-2023-29444 can be exploited by a locally authenticated adversary who can potentially escalate privileges to SYSTEM.
DLL hijacking vulnerabilities, such as CVE-2023-29444, occur when an application is tricked into loading malicious DLL files from an untrusted location.