CVE-2023-0755

Description

The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.

Remediation

Solution:

  • PTC has released the following resolutions: Update the impacted product to the latest version: ·         ThingWorx Edge C-SDK: 3.0.0 or later. ·         ThingWorx Edge MicroServer (EMS): v5.4.11 or later. ·         .NET-SDK: v5.8.5 or later. For Kepware products, the vulnerability is mitigated if the ThingWorx Interface is not enabled. To use the ThingWorx Interface without the vulnerability, update to the latest version of the product: ·         Kepware KEPServerEX: v6.13 or later. ·         ThingWorx Kepware Server (formerly ThingWorx Industrial Connectivity): v6.13 or later. ·         ThingWorx Kepware Edge: v1.6 or later. The following products should be upgraded as indicated or in accordance with the applicable organization’s recommendations if the ThingWorx Interface is in use: ·         Rockwell Automation KEPServer Enterprise: v6.13 or later. ·         GE Digital Industrial Gateway Server: v7.613 or later. For more information see PTC’s Customer Support Article .

Category

9.8
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 1.59% Top 20%
Third-Party Advisory cisa.gov
Affected: PTC ThingWorx Edge C-SDK
Affected: Microsoft .NET-SDK
Affected: PTC ThingWorx Edge MicroServer (EMS)
Affected: PTC Kepware KEPServerEX
Affected: PTC ThingWorx Kepware Server
Affected: PTC ThingWorx Industrial Connectivity
Affected: PTC ThingWorx Kepware Edge
Affected: Rockwell Automation KEPServer Enterprise
Affected: General Electric Digital Industrial Gateway Server
Published at:
Updated at:

References

Link Tags
https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01 third party advisory us government resource

Frequently Asked Questions

What is the severity of CVE-2023-0755?
CVE-2023-0755 has been scored as a critical severity vulnerability.
How to fix CVE-2023-0755?
To fix CVE-2023-0755: PTC has released the following resolutions: Update the impacted product to the latest version: ·         ThingWorx Edge C-SDK: 3.0.0 or later. ·         ThingWorx Edge MicroServer (EMS): v5.4.11 or later. ·         .NET-SDK: v5.8.5 or later. For Kepware products, the vulnerability is mitigated if the ThingWorx Interface is not enabled. To use the ThingWorx Interface without the vulnerability, update to the latest version of the product: ·         Kepware KEPServerEX: v6.13 or later. ·         ThingWorx Kepware Server (formerly ThingWorx Industrial Connectivity): v6.13 or later. ·         ThingWorx Kepware Edge: v1.6 or later. The following products should be upgraded as indicated or in accordance with the applicable organization’s recommendations if the ThingWorx Interface is in use: ·         Rockwell Automation KEPServer Enterprise: v6.13 or later. ·         GE Digital Industrial Gateway Server: v7.613 or later. For more information see PTC’s Customer Support Article .
Is CVE-2023-0755 being actively exploited in the wild?
It is possible that CVE-2023-0755 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~2% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-0755?
CVE-2023-0755 affects PTC ThingWorx Edge C-SDK, Microsoft .NET-SDK, PTC ThingWorx Edge MicroServer (EMS), PTC Kepware KEPServerEX, PTC ThingWorx Kepware Server , PTC ThingWorx Industrial Connectivity, PTC ThingWorx Kepware Edge, Rockwell Automation KEPServer Enterprise , General Electric Digital Industrial Gateway Server .
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.