First published: Wed Jan 10 2024(Updated: )
An insufficiently protected credentials vulnerability in KEPServerEX could allow an adversary to capture user credentials as the web server uses basic authentication.
Credit: ot-cert@dragos.com
Affected Software | Affected Version | How to fix |
---|---|---|
PTC KEPServerEX | >=6.0.2107.0<=6.14.263.0 | |
PTC ThingWorx Kepware Server | >=6.8<=6.14.263.0 | |
PTC ThingWorx Industrial Connectivity | >=8.0<=8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29447 is considered a medium severity vulnerability due to the potential for unauthorized access to user credentials.
To mitigate CVE-2023-29447, it is recommended to disable basic authentication and implement stronger authentication mechanisms.
CVE-2023-29447 affects versions of PTC KEPServerEX from 6.0.2107.0 to 6.14.263.0 and PTC ThingWorx products within specified version ranges.
Yes, CVE-2023-29447 can be exploited remotely, allowing attackers to capture user credentials over the network.
A temporary workaround for CVE-2023-29447 includes restricting access to the web server or using VPNs for secure access.