
CVE-2022-3092 – GE CIMPLICITY Out-of-bounds Write
https://notcve.org/view.php?id=CVE-2022-3092
07 Dec 2022 — GE CIMPICITY versions 2022 and prior is vulnerable to an out-of-bounds write, which could allow an attacker to execute arbitrary code. Las versiones 2022 y anteriores de GE CIMPICITY son vulnerables a una escritura fuera de los límites, lo que podría permitir a un atacante ejecutar código arbitrario. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-04 • CWE-787: Out-of-bounds Write •

CVE-2022-3084 – GE CIMPLICITY Access of Uninitialized Pointer
https://notcve.org/view.php?id=CVE-2022-3084
07 Dec 2022 — GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary code. GE CIMPICITY versiones 2022 y anteriores es vulnerable cuando los datos de una dirección defectuosa controlan el flujo de código a partir de gmmiObj!CGmmiRootOptionTable, lo que podría permitir a un atacante ejecutar código arbitrario. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-04 • CWE-824: Access of Uninitialized Pointer •

CVE-2022-2952 – GE CIMPLICITY Access of Uninitialized Pointer
https://notcve.org/view.php?id=CVE-2022-2952
07 Dec 2022 — GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code. GE CIMPICITY versiones 2022 y anteriores es vulnerable cuando los datos de una dirección defectuosa controlan el flujo de código a partir de gmmiObj!CGmmiOptionContainer, lo que podría permitir a un atacante ejecutar código arbitrario. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-04 • CWE-824: Access of Uninitialized Pointer •

CVE-2022-2948 – GE CIMPLICITY Heap-based Buffer Overflow
https://notcve.org/view.php?id=CVE-2022-2948
07 Dec 2022 — GE CIMPICITY versions 2022 and prior is vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code. Las versiones 2022 y anteriores de GE CIMPICITY son vulnerables a un desbordamiento de búfer de almacenamiento dinámico, lo que podría permitir a un atacante ejecutar código arbitrario. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-04 • CWE-122: Heap-based Buffer Overflow •

CVE-2022-2002 – GE CIMPLICITY Untrusted Pointer Dereference
https://notcve.org/view.php?id=CVE-2022-2002
07 Dec 2022 — GE CIMPICITY versions 2022 and prior is vulnerable when data from faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code. GE CIMPICITY versiones 2022 y anteriores es vulnerable cuando los datos de la dirección defectuosa controlan el flujo de código que comienza en gmmiObj!CGmmiOptionContainer, lo que podría permitir a un atacante ejecutar código arbitrario. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-326-04 • CWE-822: Untrusted Pointer Dereference •

CVE-2020-6992
https://notcve.org/view.php?id=CVE-2020-6992
15 Apr 2020 — A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and prior. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session. GE Digital CIMPLICITY v11.0, released January 2020, contains mitigation for this local privilege escalation vulnerability. GE Digital recommends all users upgrade to G... • https://www.us-cert.gov/ics/advisories/icsa-20-098-02 • CWE-269: Improper Privilege Management •

CVE-2016-9360
https://notcve.org/view.php?id=CVE-2016-9360
13 Feb 2017 — An issue was discovered in General Electric (GE) Proficy HMI/SCADA iFIX Version 5.8 SIM 13 and prior versions, Proficy HMI/SCADA CIMPLICITY Version 9.0 and prior versions, and Proficy Historian Version 6.0 and prior versions. An attacker may be able to retrieve user passwords if he or she has access to an authenticated session. Se encontró un problema en General Electric (GE) Proficy HMI/SCADA iFIX Version 5.8 SIM 13 y versiones anteriores, Proficy HMI/SCADA CIMPLICITY Versión 9.0 y versiones anteriores y P... • http://www.securityfocus.com/bid/95630 • CWE-522: Insufficiently Protected Credentials •

CVE-2016-5787
https://notcve.org/view.php?id=CVE-2016-5787
15 Jul 2016 — General Electric (GE) Digital Proficy HMI/SCADA - CIMPLICITY before 8.2 SIM 27 mishandles service DACLs, which allows local users to modify a service configuration via unspecified vectors. General Electric (GE) Digital Proficy HMI/SCADA - CIMPLICITY en versiones anteriores a 8.2 SIM 27 no maneja adecuadamente el servicio DACLs, lo que permite a usuarios locales modificar una configuración de servicio a través de vectores no especificados. • http://www.securityfocus.com/bid/91727 • CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2008-0176
https://notcve.org/view.php?id=CVE-2008-0176
29 Jan 2008 — Heap-based buffer overflow in w32rtr.exe in GE Fanuc CIMPLICITY HMI SCADA system 7.0 before 7.0 SIM 9, and earlier versions before 6.1 SP6 Hot fix - 010708_162517_6106, allow remote attackers to execute arbitrary code via unknown vectors. Desbordamiento de búfer basado en montículo en w32rtr.exe de GE Fanuc CIMPLICITY HMI SCADA system 7.0 versiones anteriores a 7.0 SIM 9, y versiones anteriores a 6.1 SP6 Hot fix - 010708_162517_6106, permite a atacantes remotos ejecutar código de su elección mediante vector... • http://secunia.com/advisories/28663 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •