"value":"\nGE CIMPLICITY 2023 is by a process control vulnerability, which could allow a local attacker to insert malicious configuration files in the expected web server execution path to escalate privileges and gain full control of the HMI software.\n\n"
"value":"\n\n<p>\u200bGE Digital recommends users apply the following mitigations:</p><ul><li><p>\u200bUpdate CIMPLICITY to <a target=\"_blank\" rel=\"nofollow\" href=\"https://digitalsupport.ge.com/s/article/CIMPLICITY-2023-SIM-1?language=en_US\">v2023 SIM 1</a> (login is required)</p></li></ul><p>\u200bPlease refer to <a target=\"_blank\" rel=\"nofollow\" href=\"https://digitalsupport.ge.com/s/article/GE-Digital-CIMPLICITY-Privilege-Escalation-Vulnerability\">GE Digital\u2019s security bulletin</a> (login is required) for more information.</p>"
}
],
"value":"\n\u200bGE Digital recommends users apply the following mitigations:\n\n * \u200bUpdate CIMPLICITY to v2023 SIM 1 https://digitalsupport.ge.com/s/article/CIMPLICITY-2023-SIM-1 \u00a0(login is required)\n\n\n\n\n\u200bPlease refer to GE Digital\u2019s security bulletin https://digitalsupport.ge.com/s/article/GE-Digital-CIMPLICITY-Privilege-Escalation-Vulnerability \u00a0(login is required) for more information.\n\n"
}
],
"credits":[
{
"lang":"en",
"value":"\u200bMichael Heinzl reported this vulnerability to CISA."