CVE-2020-27263
moderate-risk
Published 2021-01-14
KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.
Do I need to act?
-
0.13% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (11)
Industrial Gateway Server
Industrial Gateway Server
Kepware Kepserverex
Kepware Kepserverex
Opc-Aggregator
Thingworx Industrial Connectivity
Thingworx Kepware Server
Thingworx Kepware Server
Kepserver Enterprise
Kepserver Enterprise
Top Server
Affected Vendors
References (2)
Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-20-352-02
Third Party Advisory
https://us-cert.cisa.gov/ics/advisories/icsa-20-352-02
48
/ 100
moderate-risk
Severity
31/34 · Critical
Exploitability
1/34 · Minimal
Exposure
16/34 · Moderate