![Kepserverex v6 full](https://kumkoniak.com/35.jpg)
![kepserverex v6 full kepserverex v6 full](https://www.opcturkey.com/uploads/kep66-eng-2.jpg)
- Added support for users to enable or disable connections from Cross-Origin Resource Sharing (CORS) sources.
- The MQTT agent can be configured to subscribe to a topic on the MQTT broker to allow other publishers to write to tags under that agent.
- Added support for writes via MQTT agents.
- Added support for writing to Array data types (with the exception of String Arrays).
- In addition to JSON, XML and CSV can be generated using this template.
- Added support for an advanced template to format data for improved control over the payload being sent from the REST Client and MQTT agents.
- Expanded and corrected error handling on the MQTT engine to provide improved feedback.
- Fixed an issue where the REST Client Agent was sending an invalid Accept header, causing the connection to be rejected with an HTTP error 406.
- Fixed an issue where tag scan rate would revert to a default of 10ms if set higher than 32767.
- Fixed a defect where write requests would timeout if the device's Scan Mode was set to "Demand Poll Only.".
- Corrected an issue where “Bad” quality updates were repeatedly sent to endpoints due to being interpreted as data changes.
- Corrected an issue where the MQTT Agent could block all other agents if it did not connect on the initial attempt.
- Updated the minimum JRE version to Java 7 (JRE 1.7 32 bit) to support new gateway functionality.
- The ThingWorx binary protocol enhances configuration, performance, and secure communications.
- Added new agent type for publishing data to the ThingWorx platform.
- It is important to note that this interface is on by default after install.
- Customers that have turned off the OPC UA interface are not vulnerable.
-
- If it is not, actions may need to be taken to safely continue or to shut the system down as appropriate for the specific system.
- The industrial control system may continue to run, and the system should be designed to fail safely.
- Loss of ability to configure the application.
-
The following is range of possible impacts:.Should a malicious actor gain access to the customer’s ThingWorx Kepware application and perform a successful attack, the customer may experience a crash of ThingWorx Kepware products.Applies to all versions prior to build 6.9.584.0.ThingWorx Industrial Connectivity (deprecated replaced with ThingWorx Kepware Server).
PTC has become aware of vulnerabilities in the Kepware OPC UA server interface for.