GE CIMPLICITY 2023 is by a process control vulnerability, which could allow a local attacker to insert malicious configuration files in the expected web server execution path to escalate privileges and gain full control of the HMI software.
References
| Link | Resource |
|---|---|
| https://digitalsupport.ge.com/s/article/GE-Digital-CIMPLICITY-Privilege-Escalation-Vulnerability | Permissions Required |
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-02 | Third Party Advisory US Government Resource |
| https://digitalsupport.ge.com/s/article/GE-Digital-CIMPLICITY-Privilege-Escalation-Vulnerability | Permissions Required |
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-02 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 08:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://digitalsupport.ge.com/s/article/GE-Digital-CIMPLICITY-Privilege-Escalation-Vulnerability - Permissions Required | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-02 - Third Party Advisory, US Government Resource |
09 Sep 2023, 03:52
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Ge
Ge cimplicity |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:a:ge:cimplicity:2023:-:*:*:*:*:*:* | |
| References | (MISC) https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-02 - Third Party Advisory, US Government Resource | |
| References | (MISC) https://digitalsupport.ge.com/s/article/GE-Digital-CIMPLICITY-Privilege-Escalation-Vulnerability - Permissions Required |
05 Sep 2023, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-09-05 23:15
Updated : 2024-11-21 08:35
NVD link : CVE-2023-4487
Mitre link : CVE-2023-4487
CVE.ORG link : CVE-2023-4487
JSON object : View
Products Affected
ge
- cimplicity
CWE
CWE-114
Process Control
