CVE-2022-2848
Kepware KEPServerEX Heap-based Buffer Overflow Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16486.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-08-16 CVE Reserved
- 2022-10-21 CVE Published
- 2024-08-03 CVE Updated
- 2024-10-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-122: Heap-based Buffer Overflow
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-10 | Third Party Advisory | |
https://www.zerodayinitiative.com/advisories/ZDI-22-1454 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ge Search vendor "Ge" | Industrial Gateway Server Search vendor "Ge" for product "Industrial Gateway Server" | < 7.612 Search vendor "Ge" for product "Industrial Gateway Server" and version " < 7.612" | - |
Affected
| ||||||
Ptc Search vendor "Ptc" | Kepware Kepserverex Search vendor "Ptc" for product "Kepware Kepserverex" | < 6.12 Search vendor "Ptc" for product "Kepware Kepserverex" and version " < 6.12" | - |
Affected
| ||||||
Ptc Search vendor "Ptc" | Opc-aggregator Search vendor "Ptc" for product "Opc-aggregator" | < 6.12 Search vendor "Ptc" for product "Opc-aggregator" and version " < 6.12" | - |
Affected
| ||||||
Ptc Search vendor "Ptc" | Thingworx Industrial Connectivity Search vendor "Ptc" for product "Thingworx Industrial Connectivity" | - | - |
Affected
| ||||||
Ptc Search vendor "Ptc" | Thingworx Kepware Edge Search vendor "Ptc" for product "Thingworx Kepware Edge" | < 1.4 Search vendor "Ptc" for product "Thingworx Kepware Edge" and version " < 1.4" | - |
Affected
| ||||||
Ptc Search vendor "Ptc" | Thingworx Kepware Server Search vendor "Ptc" for product "Thingworx Kepware Server" | < 6.12 Search vendor "Ptc" for product "Thingworx Kepware Server" and version " < 6.12" | - |
Affected
| ||||||
Rockwellautomation Search vendor "Rockwellautomation" | Kepserver Enterprise Search vendor "Rockwellautomation" for product "Kepserver Enterprise" | < 6.12 Search vendor "Rockwellautomation" for product "Kepserver Enterprise" and version " < 6.12" | - |
Affected
| ||||||
Softwaretoolbox Search vendor "Softwaretoolbox" | Top Server Search vendor "Softwaretoolbox" for product "Top Server" | < 6.12 Search vendor "Softwaretoolbox" for product "Top Server" and version " < 6.12" | - |
Affected
|