An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-03 | Third Party Advisory US Government Resource |
https://www.dragos.com/advisory/ptcs-kepserverex-vulnerabilities/ | Third Party Advisory |
https://www.ptc.com/en/support/article/cs399528 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-01-10 21:15
Updated : 2024-01-19 19:50
NVD link : CVE-2023-29446
Mitre link : CVE-2023-29446
CVE.ORG link : CVE-2023-29446
JSON object : View
Products Affected
ptc
- kepware_kepserverex
- thingworx_industrial_connectivity
- thingworx_kepware_server
CWE
CWE-20
Improper Input Validation