PTC KEPServerEx
Multiple buffer overflow and improper certificate validation vulnerabilities in PTC's KEPServer family and derivatives allow unauthenticated remote code execution with SYSTEM privileges, information disclosure, and denial of service. Affected products include KEPServerEX (v6.14 and earlier), ThingWorx Kepware Server, OPC-Aggregator, ThingWorx Kepware Edge, and rebranded versions from Rockwell Automation, GE Digital, and Software Toolbox. ThingWorx Industrial Connectivity, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server, and Software Toolbox TOP Server have no patches available.
- Network access to KEPServer (default port 49320 or configured alternate port)
- No valid credentials required
- No special configuration required beyond default installation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/42594747-4c3a-4d24-87ae-f93bef1a5915Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.