使用搜索功能查看 Kepware 的信息库,其中包含 500 多篇知识库文章。缩小搜索结果范围,或在下面的搜索字段中输入您的查询。

或者,如果您无法找到解决方案,我们还有另一个资源:我们的 PTC eSupport Portal。 如果系统提示您登录 eSupport Portal,您可以使用“我的 Kepware”凭据。需要一个“我的 Kepware”帐户吗?在此处创建

搜索解决方案结果:
View All Solutions

Kepware Knowledge Base: Solution


OpenSSL Security Vulnerability does not affect KEPServerEX (CVE-2016-6304)


Last Update: 2018/11/7
OpenSSL is an open source library used by many applications to secure communications. KEPServerEX uses OpenSSL to secure communications between the server, devices, and other applications. Customers who are aware that KEPServerEX uses OpenSSL for secure communications may also monitor vulnerabilities associated with OpenSSL.

A vulnerability related to OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allows multiple memory leaks in t1_lib.c, which could allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.

The functions required for this attack to occur are not used within KEPServerEX and cannot be activated within the product.

The following link documents the vulnerability in OpenSSL:
Related Products
KEPServerEX