"value":"The affected products are vulnerable to an integer overflow or wraparound, which could allow an attacker to crash the server and remotely execute arbitrary code."
"value":"<p>PTC has released the following resolutions:</p>\n\n<p>Update the impacted product to the latest version:</p>\n\n<p>\u00b7 \nThingWorx Edge C-SDK: 3.0.0 or later.</p>\n\n<p>\u00b7 \nThingWorx Edge MicroServer (EMS): v5.4.11 or\nlater.</p>\n\n<p>\u00b7 \n.NET-SDK: v5.8.5 or later.</p>\n\n<p>For Kepware products, the vulnerability is mitigated if the\nThingWorx Interface is <b>not</b> enabled. To use the ThingWorx Interface\nwithout the vulnerability, update to the latest version of the product:</p>\n\n<p>\u00b7 \nKepware KEPServerEX: v6.13 or later.</p>\n\n<p>\u00b7 \nThingWorx Kepware Server (formerly ThingWorx\nIndustrial Connectivity): v6.13 or later.</p>\n\n<p>\u00b7 \nThingWorx Kepware Edge: v1.6 or later.</p>\n\n<p>The following products should be upgraded as indicated or in\naccordance with the applicable organization\u2019s recommendations if the ThingWorx\nInterface is in use: </p>\n\n<p>\u00b7 \nRockwell Automation KEPServer Enterprise: v6.13\nor later.</p>\n\n<p>\u00b7 \nGE Digital Industrial Gateway Server: v7.613 or\nlater.</p>\n\n<p>For\nmore information see PTC\u2019s <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ptc.com/en/support/article/CS385715\">Customer Support Article\n</a>.</p>\n\n\n\n\n\n<br>"
}
],
"value":"PTC has released the following resolutions:\n\n\n\nUpdate the impacted product to the latest version:\n\n\n\n\u00b7 \u00a0 \u00a0 \u00a0 \u00a0\nThingWorx Edge C-SDK: 3.0.0 or later.\n\n\n\n\u00b7 \u00a0 \u00a0 \u00a0 \u00a0\nThingWorx Edge MicroServer (EMS): v5.4.11 or\nlater.\n\n\n\n\u00b7 \u00a0 \u00a0 \u00a0 \u00a0\n.NET-SDK: v5.8.5 or later.\n\n\n\nFor Kepware products, the vulnerability is mitigated if the\nThingWorx Interface is not enabled. To use the ThingWorx Interface\nwithout the vulnerability, update to the latest version of the product:\n\n\n\n\u00b7 \u00a0 \u00a0 \u00a0 \u00a0\nKepware KEPServerEX: v6.13 or later.\n\n\n\n\u00b7 \u00a0 \u00a0 \u00a0 \u00a0\nThingWorx Kepware Server (formerly ThingWorx\nIndustrial Connectivity): v6.13 or later.\n\n\n\n\u00b7 \u00a0 \u00a0 \u00a0 \u00a0\nThingWorx Kepware Edge: v1.6 or later.\n\n\n\nThe following products should be upgraded as indicated or in\naccordance with the applicable organization\u2019s recommendations if the ThingWorx\nInterface is in use: \n\n\n\n\u00b7 \u00a0 \u00a0 \u00a0 \u00a0\nRockwell Automation KEPServer Enterprise: v6.13\nor later.\n\n\n\n\u00b7 \u00a0 \u00a0 \u00a0 \u00a0\nGE Digital Industrial Gateway Server: v7.613 or\nlater.\n\n\n\nFor\nmore information see PTC\u2019s Customer Support Article\n.\n\n\n\n\n\n\n\n\n"
}
],
"credits":[
{
"lang":"en",
"value":"Chris Anastasio and Steven Seeley of Incite Team reported these vulnerabilities to CISA."