This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
PTC KEPServerEX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-1454 is critical due to potential for remote code execution.
To fix ZDI-22-1454, update to the latest version of Kepware KEPServerEX as recommended by the vendor.
Organizations using affected installations of Kepware KEPServerEX are at risk from ZDI-22-1454.
Yes, ZDI-22-1454 can be exploited without authentication by remote attackers.
ZDI-22-1454 can facilitate arbitrary code execution attacks by exploiting vulnerabilities in text encoding conversions.