PTC Kepware KepServerEX (Update A)
PTC Kepware KepServerEX, ThingWorx Kepware Server, and ThingWorx Industrial Connectivity contain multiple vulnerabilities (CWE-427, CWE-20, CWE-522) that could allow a local attacker with high-privilege credentials and user interaction to escalate privileges, execute arbitrary code, and obtain server credentials and password hashes. The vulnerabilities exist in Kepware KepServerEX versions 6.14.263.0 and earlier, ThingWorx Kepware Server versions 6.14.263.0 and earlier, and ThingWorx Industrial Connectivity versions 8.0 through 8.5. PTC is developing patches expected by November 2023.
- Local access to the Kepware server system
- High-privilege account credentials (administrative or service account access)
- User interaction required (e.g., social engineering to execute a malicious file or action)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e173cf07-2a01-4bdb-99e7-11f269c399aeGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.