First published: Tue Feb 22 2022(Updated: )
The affected product is vulnerable due to cleartext transmission of credentials seen in the CIMPLICITY network, which can be easily spoofed and used to log in to make operational changes to the system.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
GE CIMPLICITY | ||
GE Proficy CIMPLICITY |
Users are advised to refer to the Secure Deployment Guide on how to configure communication encryption. Users are encouraged to review the CIMPLICITY Windows Hardening Guide and Recommendations for further IPSEC configuration guidance found in the section titled “Appendix A IPSEC Configuration.” Users are encouraged to contact a GE representative to obtain the latest versions of CIMPLICITY.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21798 is a vulnerability in the GE CIMPLICITY software that allows for cleartext transmission of credentials, potentially allowing unauthorized users to log in and make operational changes.
CVE-2022-21798 has a severity rating of 9.8, which is classified as critical.
The affected software for CVE-2022-21798 is GE CIMPLICITY.
CVE-2022-21798 can be exploited by intercepting cleartext credentials transmitted over the CIMPLICITY network and using them to log in and make unauthorized changes to the system.
To fix CVE-2022-21798, users should apply the latest security patches or updates provided by GE for the CIMPLICITY software.