CWE
122 119 120
EPSS
0.069%
Advisory Published
Updated

CVE-2023-5908: Heap Based Buffer Overflow in PTC KEPServerEx

First published: Thu Nov 30 2023(Updated: )

KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.

Credit: ics-cert@hq.dhs.gov

Affected SoftwareAffected VersionHow to fix
Ge Industrial Gateway Server<=7.614
Ptc Keepserverex<=6.14.263.0
PTC OPC-Aggregator<=6.14
PTC ThingWorx Industrial Connectivity
Ptc Thingworx Kepware Edge<=1.7
PTC ThingWorx Kepware Server<=6.14.263.0
Rockwellautomation Kepserver Enterprise<=6.14.263.0
Softwaretoolbox Top Server<=6.14.263.0

Remedy

PTC has released and recommends users to update to the following versions: * KEPServerEX should upgrade to v6.15 or later * ThingWorx Kepware Server should upgrade to v6.15 or later * ThingWorx Industrial Connectivity should upgrade to ThingWorx Kepware Server v6.15 or later * OPC-Aggregator should upgrade to v6.15 or later * ThingWorx Kepware Edge: Upgrade to v1.8 or later Refer to secure configuration guide here https://www.ptc.com/en/support/refdoc/ThingWorx_Kepware_Server/6.15/ThingWorx%20Kepware%20Server%20Secure%20Deployment%20Guide If additional questions remain, please contact PTC Technical Support https://support.ptc.com/apps/case_logger_viewer/cs/auth/ssl/log For more information, see PTC's advisory https://www.ptc.com/en/support/article/CS405439 .

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-5908?

    CVE-2023-5908 is a vulnerability in PTC KEPServerEx that allows an attacker to crash the product or leak information due to a heap-based buffer overflow.

  • Which software is affected by CVE-2023-5908?

    CVE-2023-5908 affects GE Industrial Gateway Server, PTC KEPServerEx, PTC OPC Aggregator, PTC Thingworx Industrial Connectivity, PTC Thingworx Kepware Edge, PTC Thingworx Kepware Server, Rockwellautomation Kepserver Enterprise, and Softwaretoolbox Top Server.

  • What is the severity of CVE-2023-5908?

    CVE-2023-5908 has a severity rating of 9.1 (critical).

  • How can the CVE-2023-5908 vulnerability be exploited?

    The CVE-2023-5908 vulnerability can be exploited by an attacker through a heap-based buffer overflow, potentially leading to crashing the product or leaking information.

  • How can I mitigate the CVE-2023-5908 vulnerability?

    To mitigate the CVE-2023-5908 vulnerability, it is recommended to apply the security patches or updates provided by the respective software vendors.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203