KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions are vulnerable to a stack-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and remotely execute code.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-352-02 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-20-352-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsa-20-352-02 - Third Party Advisory, US Government Resource |
Information
Published : 2021-01-14 00:15
Updated : 2024-11-21 05:20
NVD link : CVE-2020-27265
Mitre link : CVE-2020-27265
CVE.ORG link : CVE-2020-27265
JSON object : View
Products Affected
ptc
- thingworx_industrial_connectivity
- kepware_kepserverex
- opc-aggregator
- thingworx_kepware_server
rockwellautomation
- kepserver_enterprise
ge
- industrial_gateway_server
softwaretoolbox
- top_server