First published: Wed Dec 07 2022(Updated: )
GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
GE CIMPLICITY | <=2022 | |
GE CIMPLICITY | <=2022 |
GE recommends users refer to the CIMPLICITY Secure Deployment Guide https://digitalsupport.ge.com/communities/en_US/Documentation/CIMPLICITY-Secure-Deployment-Guide2 (login required) for mitigations to the reported vulnerabilities. Specific sections to reference include Section 3.5 Projects and Section 4.2 CimView. For more information about this issue, see the GE Digital Product Security Advisory https://digitalsupport.ge.com/communities/en_US/Article/GE-Digital-Security-Advisory-GED-22-06 (login required). For further questions, users should contact GE https://digitalsupport.ge.com/communities/CC_Contact .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-2952.
The severity rating of CVE-2022-2952 is 7.8 (high).
The affected software is GE CIMPICITY versions 2022 and prior.
An attacker can exploit CVE-2022-2952 by using data from a faulting address to control code flow and execute arbitrary code.
Yes, it is recommended to update to a version of GE CIMPICITY that is newer than 2022 to fix CVE-2022-2952.