CVE-2023-5908
Severity:
CRITICAL
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
30/11/2023
Last modified:
06/12/2023
Description
<br />
<br />
<br />
<br />
<br />
KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.<br />
<br />
<br />
<br />
<br />
Impact
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:ge:industrial_gateway_server:*:*:*:*:*:*:*:* | 7.614 (including) | |
cpe:2.3:a:ptc:keepserverex:*:*:*:*:*:*:*:* | 6.14.263.0 (including) | |
cpe:2.3:a:ptc:opc-aggregator:*:*:*:*:*:*:*:* | 6.14 (including) | |
cpe:2.3:a:ptc:thingworx_industrial_connectivity:-:*:*:*:*:*:*:* | ||
cpe:2.3:a:ptc:thingworx_kepware_edge:*:*:*:*:*:*:*:* | 1.7 (including) | |
cpe:2.3:a:ptc:thingworx_kepware_server:*:*:*:*:*:*:*:* | 6.14.263.0 (including) | |
cpe:2.3:a:rockwellautomation:kepserver_enterprise:*:*:*:*:*:*:*:* | 6.14.263.0 (including) | |
cpe:2.3:a:softwaretoolbox:top_server:*:*:*:*:*:*:*:* | 6.14.263.0 (including) |
To consult the complete list of CPE names with products and versions, see this page