First published: Wed Jan 10 2024(Updated: )
An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline.
Credit: ot-cert@dragos.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ptc Kepware Server | >=6.0.2107.0<=6.14.263.0 | |
Ptc Kepware Server | >=6.8<=6.14.263.0 | |
PTC ThingWorx Industrial Connectivity | >=8.0<=8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29446 is classified as a high severity vulnerability due to its potential for remote code execution through malicious project file injection.
To fix CVE-2023-29446, update to the latest version of PTC KEPServerEX or PTC ThingWorx products as advised by PTC.
CVE-2023-29446 affects PTC KEPServerEX, PTC ThingWorx Kepware Server, and PTC ThingWorx Industrial Connectivity within specified version ranges.
Exploitation of CVE-2023-29446 can lead to the capture of NTLMv2 hashes, allowing adversaries to potentially crack them offline.
As of now, there is no publicly disclosed exploit specifically for CVE-2023-29446, but the vulnerability itself poses serious risks if left unpatched.