First published: Wed Dec 07 2022(Updated: )
GE CIMPICITY versions 2022 and prior is vulnerable when data from faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
GE CIMPLICITY | <=2022 | |
GE CIMPLICITY | <=2022 |
GE recommends users refer to the CIMPLICITY Secure Deployment Guide https://digitalsupport.ge.com/communities/en_US/Documentation/CIMPLICITY-Secure-Deployment-Guide2 (login required) for mitigations to the reported vulnerabilities. Specific sections to reference include Section 3.5 Projects and Section 4.2 CimView. For more information about this issue, see the GE Digital Product Security Advisory https://digitalsupport.ge.com/communities/en_US/Article/GE-Digital-Security-Advisory-GED-22-06 (login required). For further questions, users should contact GE https://digitalsupport.ge.com/communities/CC_Contact .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this GE CIMPICITY vulnerability is CVE-2022-2002.
CVE-2022-2002 has a severity score of 7.8 (high).
GE CIMPICITY versions 2022 and prior are affected by CVE-2022-2002.
CVE-2022-2002 vulnerability allows an attacker to execute arbitrary code by controlling the code flow starting at gmmiObj!CGmmiOptionContainer.
At the moment, there is no specific fix available for CVE-2022-2002. It is recommended to apply updates from the vendor when they become available.