Product:

Thingworx_industrial_connectivity

(Ptc)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 13
Date Id Summary Products Score Patch Annotated
2021-01-14 CVE-2020-27265 KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions are vulnerable to a stack-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and remotely execute code. Industrial_gateway_server, Kepware_kepserverex, Opc\-Aggregator, Thingworx_industrial_connectivity, Thingworx_kepware_server, Kepserver_enterprise, Top_server 9.8
2021-01-14 CVE-2020-27267 KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity (all versions), OPC-Aggregator (all versions), Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server v7.68.804 and v7.66, and Software Toolbox TOP Server all 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data. Industrial_gateway_server, Kepware_kepserverex, Opc\-Aggregator, Thingworx_industrial_connectivity, Thingworx_kepware_server, Kepserver_enterprise, Top_server 9.1
2023-02-23 CVE-2023-0754 The affected products are vulnerable to an integer overflow or wraparound, which could  allow an attacker to crash the server and remotely execute arbitrary code. Digital_industrial_gateway_server, Kepware_server, Kepware_serverex, Thingworx_\.net\-Sdk, Thingworx_edge_c\-Sdk, Thingworx_edge_microserver, Thingworx_industrial_connectivity, Thingworx_kepware_edge, Kepserver_enterprise 9.8
2023-02-23 CVE-2023-0755 The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code. Digital_industrial_gateway_server, Kepware_server, Kepware_serverex, Thingworx_\.net\-Sdk, Thingworx_edge_c\-Sdk, Thingworx_edge_microserver, Thingworx_industrial_connectivity, Thingworx_kepware_edge, Kepserver_enterprise 9.8
2023-11-30 CVE-2023-5908 KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information. Industrial_gateway_server, Keepserverex, Opc\-Aggregator, Thingworx_industrial_connectivity, Thingworx_kepware_edge, Thingworx_kepware_server, Kepserver_enterprise, Top_server 9.1
2023-11-30 CVE-2023-5909 KEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect. Industrial_gateway_server, Keepserverex, Opc\-Aggregator, Thingworx_industrial_connectivity, Thingworx_kepware_edge, Thingworx_kepware_server, Kepserver_enterprise, Top_server 7.5
2024-01-10 CVE-2023-29445 An uncontrolled search path element vulnerability (DLL hijacking) has been discovered that could allow a locally authenticated adversary to escalate privileges to SYSTEM. Kepware_kepserverex, Thingworx_industrial_connectivity, Thingworx_kepware_server 7.8
2024-01-10 CVE-2023-29446 An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline. Kepware_kepserverex, Thingworx_industrial_connectivity, Thingworx_kepware_server 4.7
2024-01-10 CVE-2023-29444 An uncontrolled search path element vulnerability (DLL hijacking) has been discovered that could allow a locally authenticated adversary to escalate privileges to SYSTEM. Alternatively, they could host a trojanized version of the software and trick victims into downloading and installing their malicious version to gain initial access and code execution. Kepware_kepserverex, Thingworx_industrial_connectivity, Thingworx_kepware_server 7.3
2024-01-10 CVE-2023-29447 An insufficiently protected credentials vulnerability in KEPServerEX could allow an adversary to capture user credentials as the web server uses basic authentication. Kepware_kepserverex, Thingworx_industrial_connectivity, Thingworx_kepware_server 5.3