PTC Kepware ThingWorx Kepware Server
A resource exhaustion vulnerability in PTC Kepware ThingWorx Kepware Server, KEPServerEX, Software Toolbox TOP Server, and GE IGS allows an attacker on the local network to crash the target device via specially crafted network traffic. Successful exploitation causes a denial of service, interrupting data collection and alarming from all connected industrial devices. No public exploitation has been reported. PTC states no fix will be available; the vendor recommends following the Kepware Secure Deployment Guide and maintaining proper access control on manufacturing networks.
- Network access to the Kepware server on the local network or via remote access methods (VPN, RDP)
- No authentication required
- High complexity attack—requires crafted network traffic
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cb500edf-e4b7-4725-82ea-21cd117cb0ecGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.