MS VS UNC Path Injection via Malicious Project Captures NTLMv2 Hashes
CVE-2023-29446 Published on January 10, 2024
Improper Input Validation in PTC's Kepware KEPServerEX
An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline.
Vulnerability Analysis
CVE-2023-29446 is exploitable with local system access, requires user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
What is a Windows UNC Share Vulnerability?
An attacker can inject a Windows UNC share ('\\UNC\share\name') into a software system to potentially redirect access to an unintended location or arbitrary file.
CVE-2023-29446 has been classified to as a Windows UNC Share vulnerability or weakness.
Products Associated with CVE-2023-29446
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-29446 are published in these products:
Affected Versions
PTC Kepware KEPServerEX:- Before and including 6.14.263.0 is affected.
- Before and including 6.14.263.0 is affected.
- Version 8.0, <= 8.5 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.