使用搜索功能查看 Kepware 的信息库,其中包含 500 多篇知识库文章。缩小搜索结果范围,或在下面的搜索字段中输入您的查询。

或者,如果您无法找到解决方案,我们还有另一个资源:我们的 PTC eSupport Portal。 如果系统提示您登录 eSupport Portal,您可以使用“我的 Kepware”凭据。需要一个“我的 Kepware”帐户吗?在此处创建

搜索解决方案结果:
View All Solutions

Kepware Knowledge Base: Solution


OpenSSL Security Vulnerability (KEPServerEX 5.21 Release)


Last Update: 2018/11/12
Customers using the KEPServerEX OPC UA server or OPC UA Client driver should be aware of security vulnerabilities discovered in OpenSSL that impact KEPServerEX version 5.20.396 and earlier. Customers not using the OPC UA server or OPC UA Client driver for KEPServerEX can disregard this article.

OpenSSL is an open-source library used by many OPC UA applications to secure communications. KEPServerEX uses OpenSSL to secure communications with the OPC UA server and OPC UA Client driver. Recently discovered vulnerabilities in OpenSSL could impact these products by allowing a remote attacker to intercept, decrypt, and manipulate data between KEPServerEX and a UA endpoint.

The following link documents the vulnerability in OpenSSL:

The vulnerability relates to the AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h. Those versions do not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive clear-text information via a padding-oracle attack against an AES CBC session. This can lead to unauthorized access to sensitive information.

The more accessible the OPC UA server is, the more vulnerable it is to this attack. For example, if the OPC UA server is only available on the LAN or controls network, the exposure is limited. A rogue application would need to penetrate this network and exploit the vulnerability from a compromised machine on the network. If the OPC UA server is accessible via the WAN, it is more susceptible to this vulnerability. Any machine that can access the OPC UA server on the network could exploit this vulnerability.

Because KEPServerEX only installs a Localhost UA endpoint by default, only applications running on the same machine as KEPServerEX could exploit this vulnerability. Enabling a non-localhost endpoint makes a machine more susceptible, but it depends on how accessible the OPC UA server is on the network.

Kepware addressed these issues by upgrading to OpenSSL version 1.0.2h in KEPServerEX version 5.21.112, which was released on August 16, 2016.

We apologize for any inconvenience this may cause.
Related Products
OPC UA Client

Related Protocols
OPC Unified Architecture (UA)