First published: Wed Jul 19 2023(Updated: )
All versions of GE Digital CIMPLICITY that are not adhering to SDG guidance and accepting documents from untrusted sources are vulnerable to memory corruption issues due to insufficient input validation, including issues such as out-of-bounds reads and writes, use-after-free, stack-based buffer overflows, uninitialized pointers, and a heap-based buffer overflow. Successful exploitation could allow an attacker to execute arbitrary code.
Credit: ics-cert@hq.dhs.gov ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
GE CIMPLICITY | ||
GE Digital CIMPLICITY |
To obtain the latest versions of GE CIMPLICITY, contact your local GE Digital representative at https://digitalsupport.ge.com/s/contactsupport https://digitalsupport.ge.com/s/contactsupport . Exploit is only possible if an authenticated user with local access to the system obtains and opens a document from a malicious source so secure deployment and strong access management by users is essential. GE Digital and customers have a shared responsibility for security and users are required to adhere to the most recent Secure Deployment Guide (SDG) instructions https://digitalsupport.ge.com/s/article/CIMPLICITY-Secure-Deployment-Guide2 . Please refer to GE Digital’s security bulletin https://digitalsupport.ge.com/s/article/GE-Digital-CIMPLICITY-Memory-Corruption-Vulnerability for more information.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3463 is a vulnerability found in all versions of GE Digital CIMPLICITY that are not adhering to SDG guidance and accepting documents from untrusted sources.
The severity of CVE-2023-3463 is critical with a CVSS score of 9.8.
CVE-2023-3463 affects all versions of GE CIMPLICITY that are not adhering to SDG guidance and accepting documents from untrusted sources.
CVE-2023-3463 can lead to memory corruption issues, including out-of-bounds reads and writes, use-after-free, and stack-based buffer overflow.
To fix CVE-2023-3463, it is recommended to follow the SDG guidance and ensure that GE CIMPLICITY does not accept documents from untrusted sources.