検索機能を使用して 500 を上回る Kepware の知識ベース記事の中から閲覧します。結果を絞り込むか、クエリーを下部の検索フィールドに入力します。

解決策が見つからなかった場合には、当社の PTC eSupport Portal で追加資料を確認することもできます。eSupport Portal へのログインを要求された場合、My Kepware の認証情報を使用できます。My Kepware アカウントが必要ですか? こちらで作成

各種検索方法:
View All Solutions

Kepware Knowledge Base: Solution


OpenSSL Security Vulnerability does not affect KEPServerEX (CVE-2016-6304)


Last Update: 2018/11/07
OpenSSL is an open source library used by many applications to secure communications. KEPServerEX uses OpenSSL to secure communications between the server, devices, and other applications. Customers who are aware that KEPServerEX uses OpenSSL for secure communications may also monitor vulnerabilities associated with OpenSSL.

A vulnerability related to OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allows multiple memory leaks in t1_lib.c, which could allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.

The functions required for this attack to occur are not used within KEPServerEX and cannot be activated within the product.

The following link documents the vulnerability in OpenSSL:
Related Products
KEPServerEX