CVE-2020-27263
14.01.2021, 00:15
KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.Enginsight
Vendor | Product | Version |
---|---|---|
ge | industrial_gateway_server | 7.66 |
ge | industrial_gateway_server | 7.68.804 |
ptc | kepware_kepserverex | 6.0 |
ptc | kepware_kepserverex | 6.9 |
ptc | opc-aggregator | - |
ptc | thingworx_industrial_connectivity | - |
ptc | thingworx_kepware_server | 6.8 |
ptc | thingworx_kepware_server | 6.9 |
rockwellautomation | kepserver_enterprise | 6.6.504.0 |
rockwellautomation | kepserver_enterprise | 6.9.572.0 |
softwaretoolbox | top_server | 6.0 ≤ 𝑥 ≤ 6.9 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-122 - Heap-based Buffer OverflowA heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.