First published: Wed Dec 07 2022(Updated: )
GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
GE CIMPLICITY | <=2022 | |
GE CIMPLICITY | <=2022 |
GE recommends users refer to the CIMPLICITY Secure Deployment Guide https://digitalsupport.ge.com/communities/en_US/Documentation/CIMPLICITY-Secure-Deployment-Guide2 (login required) for mitigations to the reported vulnerabilities. Specific sections to reference include Section 3.5 Projects and Section 4.2 CimView. For more information about this issue, see the GE Digital Product Security Advisory https://digitalsupport.ge.com/communities/en_US/Article/GE-Digital-Security-Advisory-GED-22-06 (login required). For further questions, users should contact GE https://digitalsupport.ge.com/communities/CC_Contact .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-3084.
The severity of CVE-2022-3084 is high with a value of 7.8.
GE CIMPICITY versions 2022 and prior are affected by CVE-2022-3084.
An attacker can exploit CVE-2022-3084 by using data from a faulting address to control code flow, potentially allowing them to execute arbitrary code.
At the moment, there is no information available about a fix for CVE-2022-3084. It is recommended to follow the guidance provided by the referenced advisory for mitigations and updates.