Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-2848


This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16486.


Published

2023-03-29T19:15:11.680

Last Modified

2025-02-18T17:15:13.367

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.1 (CRITICAL)

Weaknesses
  • Type: Primary
    CWE-122
  • Type: Secondary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application ge industrial_gateway_server < 7.612 Yes
Application ptc kepware_kepserverex < 6.12 Yes
Application ptc opc-aggregator < 6.12 Yes
Application ptc thingworx_industrial_connectivity - Yes
Application ptc thingworx_kepware_edge < 1.4 Yes
Application ptc thingworx_kepware_server < 6.12 Yes
Application rockwellautomation kepserver_enterprise < 6.12 Yes
Application softwaretoolbox top_server < 6.12 Yes

References