KEPSERVEREX UPDATE
Software Toolbox has released updates and recommends users update their installations.ĬISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability.
KEPSERVEREX UPGRADE
Rockwell recommends users upgrade to the most current version available, depending on the base version of the affected product they are using.
Uri Katz of Claroty reported these vulnerabilities to PTC. COMPANY HEADQUARTERS LOCATION: United States.CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing.A CVSS v3 base score of 7.5 has been calculated the CVSS vector string is ( AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
KEPSERVEREX FREE
The affected products are vulnerable to a use after free vulnerability, which may allow an attacker to create and close OPC UA connections at a high rate that may cause a server to crash.ĬVE-2020-27267 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated the CVSS vector string is ( AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H). Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.ĬVE-2020-27263 has been assigned to this vulnerability. The affected products are vulnerable to a heap-based buffer overflow. A CVSS v3 base score of 9.8 has been calculated the CVSS vector string is ( AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Opening a specifically crafted OPC UA message could allow an attacker to crash the server and remotely execute code.ĬVE-2020-27265 has been assigned to this vulnerability. The affected products are vulnerable to a stack-based buffer overflow. End Update A Part 1 of 2 - 4.2 VULNERABILITY OVERVIEW 4.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 Software Toolbox TOP Server: All 6.x versions.GE Digital Industrial Gateway Server: v7.68.804 and v7.66.
KEPSERVEREX CODE
Successful exploitation of these vulnerabilities could lead to a server crashing, a denial-of-service condition, data leakage, or remote code execution. This updated advisory is a follow-up to the original advisory titled ICSA-20-352-02 PTC Kepware KEPServerEX that was published December 17, 2020, on the ICS webpage on. Vulnerabilities: Stack-based Buffer Overflow, Heap-based Buffer Overflow, Use After Free.
ATTENTION: Exploitable remotely/low skill level to exploit.