ptc CVE Vulnerabilities & Metrics

Focus on ptc vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About ptc Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with ptc. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total ptc CVEs: 32
Earliest CVE date: 18 Oct 2007, 20:17 UTC
Latest CVE date: 27 Aug 2024, 16:15 UTC

Latest CVE reference: CVE-2024-40395

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -92.86%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -92.86%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical ptc CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.04

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 18
4.0-6.9 11
7.0-8.9 3
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS ptc CVEs

These are the five CVEs with the highest CVSS scores for ptc, sorted by severity first and recency.

All CVEs for ptc

CVE-2024-40395 ptc vulnerability CVSS: 0 27 Aug 2024, 16:15 UTC

An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5.0 allows attackers to view sensitive information, including PII, regardless of access level.

CVE-2023-29447 ptc vulnerability CVSS: 0 10 Jan 2024, 21:15 UTC

An insufficiently protected credentials vulnerability in KEPServerEX could allow an adversary to capture user credentials as the web server uses basic authentication.

CVE-2023-29446 ptc vulnerability CVSS: 0 10 Jan 2024, 21:15 UTC

An improper input validation vulnerability has been discovered that could allow an adversary to inject a UNC path via a malicious project file. This allows an adversary to capture NLTMv2 hashes and potentially crack them offline.

CVE-2023-29445 ptc vulnerability CVSS: 0 10 Jan 2024, 21:15 UTC

An uncontrolled search path element vulnerability (DLL hijacking) has been discovered that could allow a locally authenticated adversary to escalate privileges to SYSTEM.

CVE-2023-29444 ptc vulnerability CVSS: 0 10 Jan 2024, 17:15 UTC

An uncontrolled search path element vulnerability (DLL hijacking) has been discovered that could allow a locally authenticated adversary to escalate privileges to SYSTEM. Alternatively, they could host a trojanized version of the software and trick victims into downloading and installing their malicious version to gain initial access and code execution.

CVE-2023-5909 ptc vulnerability CVSS: 0 30 Nov 2023, 22:15 UTC

KEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect.

CVE-2023-5908 ptc vulnerability CVSS: 0 30 Nov 2023, 22:15 UTC

KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.

CVE-2023-31200 ptc vulnerability CVSS: 0 07 Jun 2023, 22:15 UTC

PTC Vuforia Studio does not require a token; this could allow an attacker with local access to perform a cross-site request forgery attack or a replay attack.

CVE-2023-29502 ptc vulnerability CVSS: 0 07 Jun 2023, 22:15 UTC

Before importing a project into Vuforia, a user could modify the “resourceDirectory” attribute in the appConfig.json file to be a different path.

CVE-2023-29168 ptc vulnerability CVSS: 0 07 Jun 2023, 22:15 UTC

The local Vuforia web application does not support HTTPS, and federated credentials are passed via basic authentication.

CVE-2023-29152 ptc vulnerability CVSS: 0 07 Jun 2023, 22:15 UTC

By changing the filename parameter in the request, an attacker could delete any file with the permissions of the Vuforia server account.

CVE-2023-27881 ptc vulnerability CVSS: 0 07 Jun 2023, 22:15 UTC

A user could use the “Upload Resource” functionality to upload files to any location on the disk.

CVE-2023-24476 ptc vulnerability CVSS: 0 07 Jun 2023, 22:15 UTC

An attacker with local access to the machine could record the traffic, which could allow them to resend requests without the server authenticating that the user or session are valid.

CVE-2022-2848 ptc vulnerability CVSS: 0 29 Mar 2023, 19:15 UTC

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16486.

CVE-2022-2825 ptc vulnerability CVSS: 0 29 Mar 2023, 19:15 UTC

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-18411.

CVE-2023-0755 ptc vulnerability CVSS: 0 23 Feb 2023, 22:15 UTC

The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.

CVE-2023-0754 ptc vulnerability CVSS: 0 23 Feb 2023, 22:15 UTC

The affected products are vulnerable to an integer overflow or wraparound, which could  allow an attacker to crash the server and remotely execute arbitrary code.

CVE-2022-25252 ptc vulnerability CVSS: 5.0 16 Mar 2022, 15:15 UTC

When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) when receiving certain input throws an exception. Services using said function do not handle the exception. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to crash the affected product.

CVE-2022-25251 ptc vulnerability CVSS: 7.5 16 Mar 2022, 15:15 UTC

When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) may allow an attacker to send certain XML messages to a specific port without proper authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to read and modify the affected product’s configuration.

CVE-2022-25250 ptc vulnerability CVSS: 5.0 16 Mar 2022, 15:15 UTC

When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) may allow an attacker to send a certain command to a specific port without authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to shut down a specific service.

CVE-2022-25249 ptc vulnerability CVSS: 5.0 16 Mar 2022, 15:15 UTC

When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) (disregarding Axeda agent v6.9.2 and v6.9.3) is vulnerable to directory traversal, which could allow a remote unauthenticated attacker to obtain file system read access via web server..

CVE-2022-25248 ptc vulnerability CVSS: 5.0 16 Mar 2022, 15:15 UTC

When connecting to a certain port Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) supplies the event log of the specific service.

CVE-2022-25247 ptc vulnerability CVSS: 10.0 16 Mar 2022, 15:15 UTC

Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) may allow an attacker to send certain commands to a specific port without authentication. Successful exploitation of this vulnerability could allow a remote unauthenticated attacker to obtain full file-system access and remote code execution.

CVE-2022-25246 ptc vulnerability CVSS: 9.0 16 Mar 2022, 15:15 UTC

Axeda agent (All versions) and Axeda Desktop Server for Windows (All versions) uses hard-coded credentials for its UltraVNC installation. Successful exploitation of this vulnerability could allow a remote authenticated attacker to take full remote control of the host operating system.

CVE-2020-27267 ptc vulnerability CVSS: 6.4 14 Jan 2021, 00:15 UTC

KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity (all versions), OPC-Aggregator (all versions), Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server v7.68.804 and v7.66, and Software Toolbox TOP Server all 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.

CVE-2020-27265 ptc vulnerability CVSS: 7.5 14 Jan 2021, 00:15 UTC

KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions are vulnerable to a stack-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and remotely execute code.

CVE-2020-27263 ptc vulnerability CVSS: 6.4 14 Jan 2021, 00:15 UTC

KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.

CVE-2018-20092 ptc vulnerability CVSS: 5.0 17 Dec 2018, 19:29 UTC

PTC ThingWorx Platform through 8.3.0 is vulnerable to a directory traversal attack on ZIP files via a POST request.

CVE-2018-17218 ptc vulnerability CVSS: 3.5 01 Oct 2018, 01:29 UTC

An issue was discovered in PTC ThingWorx Platform 6.5 through 8.2. There is reflected XSS in the SQUEAL search function.

CVE-2018-17217 ptc vulnerability CVSS: 5.0 01 Oct 2018, 01:29 UTC

An issue was discovered in PTC ThingWorx Platform 6.5 through 8.2. There is a hardcoded encryption key.

CVE-2018-17216 ptc vulnerability CVSS: 4.0 01 Oct 2018, 01:29 UTC

An issue was discovered in PTC ThingWorx Platform 6.5 through 8.2. There is password hash exposure to privileged users.

CVE-2015-2061 ptc vulnerability CVSS: 7.5 09 Mar 2015, 14:59 UTC

Heap-based buffer overflow in the browser plugin for PTC Creo View allows remote attackers to execute arbitrary code via vectors involving setting a large buffer to an unspecified attribute.

CVE-2014-9267 ptc vulnerability CVSS: 6.8 08 Dec 2014, 16:59 UTC

Heap-based buffer overflow in the PTC IsoView ActiveX control allows remote attackers to execute arbitrary code via a crafted ViewPort property value.

CVE-2007-4600 ptc vulnerability CVSS: 4.6 18 Oct 2007, 20:17 UTC

The "Protect Worksheet" functionality in Mathsoft Mathcad 12 through 13.1, and PTC Mathcad 14, implements file access restrictions via a protection element in a gzipped XML file, which allows attackers to bypass these restrictions by removing this element.