First published: Tue Apr 11 2023(Updated: )
ToolboxST prior to version 7.10 is affected by a deserialization vulnerability. An attacker with local access to an HMI or who has conducted a social engineering attack on an authorized operator could execute code in a Toolbox user's context through the deserialization of an untrusted configuration file. Two CVSS scores have been provided to capture the differences between the two aforementioned attack vectors. Customers are advised to update to ToolboxST 7.10 which can be found in ControlST 7.10. If unable to update at this time customers should ensure they are following the guidance laid out in GE Gas Power's Secure Deployment Guide (GEH-6839). Customers should ensure they are not running ToolboxST as an Administrative user.
Credit: GEPowerCVD@ge.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ge Toolboxst | <7.10 |
Update to ToolboxST version >=7.10 (available in ControlST >=7.10)
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1552 is a deserialization vulnerability affecting ToolboxST prior to version 7.10.
CVE-2023-1552 allows an attacker with local access to an HMI or who has conducted a social engineering attack on an authorized operator to execute code in a Toolbox user's context through the deserialization of an untrusted configuration.
The severity of CVE-2023-1552 is high with a CVSS score of 7.8.
To fix CVE-2023-1552, update ToolboxST to version 7.10 or above.
You can find more information about CVE-2023-1552 in the reference provided by GE: [Link](https://www.ge.com/content/dam/cyber_security/global/en_US/pdfs/2023-03-23_ToolboxST_Deserialization_of_Untrusted_Configuration_Data.pdf).