使用搜索功能查看 Kepware 的信息库,其中包含 500 多篇知识库文章。缩小搜索结果范围,或在下面的搜索字段中输入您的查询。

或者,如果您无法找到解决方案,我们还有另一个资源:我们的 PTC eSupport Portal。 如果系统提示您登录 eSupport Portal,您可以使用“我的 Kepware”凭据。需要一个“我的 Kepware”帐户吗?在此处创建

搜索解决方案结果:
View All Solutions

Kepware Knowledge Base: Solution


OpenSSL Update for OPC UA Components in KEPServerEX 5.18 Release


Last Update: 2018/11/12
Customers not using the OPC UA server or OPC UA Client driver for KEPServerEX can disregard this article. Customers using either solution should be aware of security vulnerabilities discovered in OpenSSL that impact these products in KEPServerEX version 5.18.662 and earlier.

OpenSSL is an open source library used by many OPC UA applications to secure communications. KEPServerEX uses OpenSSL to secure communications with our OPC UA server interface and OPC UA Client driver. Vulnerabilities were recently discovered in OpenSSL that have the potential to impact these products. By exploiting these vulnerabilities, a remote attacker could cause KEPServerEX to crash or become unresponsive.

The following links document the vulnerabilities in OpenSSL that have the potential to impact all OPC UA applications:
Both vulnerabilities relate to certificate validation in OpenSSL. If an attacker sends an OPC UA server a command with a specially-crafted certificate, OpenSSL will try and validate the certificate in doing so, it will access invalid memory or process the certificate indefinitely. This can lead to an application crash or a denial of service.

The more accessible the OPC UA server is, the more vulnerable it is to this attack. For example, if the OPC UA server is only available on the LAN or controls network, the exposure is limited. A rogue application would need to penetrate this network and exploit the vulnerability from a compromised machine on the network. If the OPC UA server is accessible via the WAN, it is more susceptible to attack. Any machine that can access the OPC UA server on the network could exploit this vulnerability.

Because KEPServerEX only installs a Localhost UA endpoint by default, only applications running on the same machine as KEPServerEX could exploit this vulnerability, which is unlikely. Enabling a non-localhost endpoint makes a machine more susceptible, but again, it depends on how accessible the OPC UA server is on the network.

Kepware addressed these issues by upgrading to OpenSSL version 1.0.2d in KEPServerEX version 5.18.673, which was released on August 17, 2015.

We apologize for any inconvenience this may cause.
Related Products
KEPServerEX, OPC UA Client

Related Protocols
OPC Unified Architecture (UA)