{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-6098","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2024-06-17T21:40:20.832Z","datePublished":"2024-08-16T14:57:51.023Z","dateUpdated":"2024-08-19T17:32:48.721Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Kepware ThingWorx Kepware Server","vendor":"PTC","versions":[{"status":"affected","version":"V6"}]},{"defaultStatus":"unaffected","product":"Kepware KEPServerEX","vendor":"PTC","versions":[{"status":"affected","version":"V6"}]},{"defaultStatus":"unaffected","product":"TOP Server","vendor":"Software Toolbox","versions":[{"status":"affected","version":"V6"}]},{"defaultStatus":"unaffected","product":"IGS","vendor":"GE","versions":[{"status":"affected","version":"V7.6x"}]}],"credits":[{"lang":"en","type":"finder","value":"Sharon Brizinov and Vera Mens of Claroty Research - Team82 reported this vulnerability to PTC."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"When performing an online tag generation to devices which communicate \nusing the ControlLogix protocol, a machine-in-the-middle, or a device \nthat is not configured correctly, could deliver a response leading to \nunrestricted or unregulated resource allocation. This could cause a \ndenial-of-service condition and crash the Kepware application. By \ndefault, these functions are turned off, yet they remain accessible for \nusers who recognize and require their advantages."}],"value":"When performing an online tag generation to devices which communicate \nusing the ControlLogix protocol, a machine-in-the-middle, or a device \nthat is not configured correctly, could deliver a response leading to \nunrestricted or unregulated resource allocation. This could cause a \ndenial-of-service condition and crash the Kepware application. By \ndefault, these functions are turned off, yet they remain accessible for \nusers who recognize and require their advantages."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"PRESENT","attackVector":"ADJACENT","baseScore":5.9,"baseSeverity":"MEDIUM","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-770","description":"CWE-770 Allocation of Resources Without Limits or Throttling","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2024-08-16T14:57:51.023Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-228-11"},{"url":"https://www.ptc.com/en/support/article/CS423892"}],"source":{"advisory":"ICSA-24-228-11","discovery":"EXTERNAL"},"title":"PTC Kepware ThingWorx Kepware Server Allocation of Resources Without Limits or Throttling","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"PTC recommends users take a defense-in-depth stance with regards to \ntheir manufacturing networks ensuring proper access control is \nmaintained. Additionally, proper adherence to the <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ptc.com/support/-/media/support/refdocs/ThingWorx_Kepware_Server/6,-d-,16/secure_deployment_guide_tks.pdf?sc_lang=en&amp;source=search\">Kepware Secure Deployment Guide</a><p> will minimize this threat through accurate configuration and use of the product.</p>\n<p>Please refer to <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.ptc.com/en/support/article/CS423892\">this article (login required)</a></p><p> for specific information on how this risk may be mitigated in your environment.</p>\n<p>If additional questions remain, contact <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.ptc.com/apps/case_logger_viewer/cs/auth/ssl/log?\">PTC Technical Support.</a></p>\n\n<br>"}],"value":"PTC recommends users take a defense-in-depth stance with regards to \ntheir manufacturing networks ensuring proper access control is \nmaintained. Additionally, proper adherence to the  Kepware Secure Deployment Guide https://www.ptc.com/support/-/media/support/refdocs/ThingWorx_Kepware_Server/6,-d-,16/secure_deployment_guide_tks.pdf  will minimize this threat through accurate configuration and use of the product.\n\n\nPlease refer to  this article (login required) https://www.ptc.com/en/support/article/CS423892 \n\n for specific information on how this risk may be mitigated in your environment.\n\n\nIf additional questions remain, contact  PTC Technical Support. https://support.ptc.com/apps/case_logger_viewer/cs/auth/ssl/log"}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-19T17:32:29.303502Z","id":"CVE-2024-6098","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-19T17:32:48.721Z"}}]}}