CVE-2022-2848
PTC KEPServerEX vulnerability analysis and mitigation

Overview

CVE-2022-2848 is a heap-based buffer overflow vulnerability affecting Kepware KEPServerEX, a connectivity platform. The vulnerability was discovered by Vera Mens, Uri Katz, and Sharon Brizinov of Claroty Research, working with Trend Micro's Zero Day Initiative. The flaw exists within the handling of text encoding conversions and affects multiple versions of PTC products including Kepware KEPServerEX, ThingWorkx Kepware Server, ThingWorkx Industrial Connectivity, OPC-Aggregator, and ThingWorkx Kepware Edge (CISA Advisory, ZDI Advisory).

Technical details

The vulnerability stems from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. Specifically crafted OPC UA messages transmitted to the server could allow an attacker to crash the server and leak data. The vulnerability has been assigned a CVSS v3 base score of 9.1 with the vector string AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H, indicating a critical severity level. The flaw is classified under CWE-122 (Heap-based Buffer Overflow) (ZDI Advisory, CISA Advisory).

Impact

Successful exploitation of this vulnerability could allow remote attackers to execute arbitrary code in the context of SYSTEM, crash the server, and leak sensitive data. The vulnerability affects multiple critical infrastructure sectors worldwide (CISA Advisory, ZDI Advisory).

Mitigation and workarounds

PTC has released updates to address this vulnerability. Users should upgrade Kepware KEPServerEX to v6.12 or later, ThingWorx Kepware Server to v6.12 or later, OPC-Aggregator to v6.12 or later, and ThingWorx Kepware Edge to v1.5 or later. Additionally, CISA recommends minimizing network exposure for control system devices, ensuring they are not accessible from the Internet, and locating control system networks behind firewalls isolated from business networks (CISA Advisory).

Additional resources


SourceThis report was generated using AI

Related PTC KEPServerEX vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-29445HIGH7.8
  • PTC KEPServerEXPTC KEPServerEX
  • cpe:2.3:a:ptc:kepware_kepserverex
NoYesJan 10, 2024
CVE-2023-29444HIGH7.3
  • PTC KEPServerEXPTC KEPServerEX
  • cpe:2.3:a:ptc:kepware_kepserverex
NoYesJan 10, 2024
CVE-2024-6098MEDIUM5.9
  • PTC KEPServerEXPTC KEPServerEX
  • cpe:2.3:a:ptc:kepware_kepserverex
NoYesAug 16, 2024
CVE-2023-29447MEDIUM5.3
  • PTC KEPServerEXPTC KEPServerEX
  • cpe:2.3:a:ptc:kepware_kepserverex
NoYesJan 10, 2024
CVE-2023-29446MEDIUM4.7
  • PTC KEPServerEXPTC KEPServerEX
  • cpe:2.3:a:ptc:kepware_kepserverex
NoYesJan 10, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management