"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-03-16 20:00:34 +00:00
parent 8456220366
commit 85b4686c4c
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
3 changed files with 139 additions and 4 deletions

View File

@ -71,6 +71,16 @@
"url": "https://www.libraw.org/",
"refsource": "MISC",
"name": "https://www.libraw.org/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2023-220878f1bf",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7TEZ7CLRNYYQZJ5NJGZXK6YJU46WH2L/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2023-be842ba7fb",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ICTVDRGBWGIFBTUWJLGX7QM5GWBWUG7/"
}
]
}

View File

@ -63,6 +63,16 @@
"refsource": "FEDORA",
"name": "FEDORA-2023-6c1200da3d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2023-f5d075f7f2",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2023-40b675d7ae",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/"
}
]
},

View File

@ -1,17 +1,132 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-0598",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "GE Digital Proficy iFIX 2022, GE Digital Proficy iFIX v6.1, and GE Digital Proficy iFIX v6.5 are vulnerable to code injection, which may allow an attacker to insert malicious configuration files in the expected web server execution path and gain full control of the HMI software."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-94 Code Injection",
"cweId": "CWE-94"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GE Digital ",
"product": {
"product_data": [
{
"product_name": "Proficy iFIX",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "2022 "
},
{
"version_affected": "=",
"version_value": "v6.1 "
},
{
"version_affected": "=",
"version_value": " v6.5 "
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-03",
"refsource": "MISC",
"name": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-03"
},
{
"url": "https://digitalsupport.ge.com/s/article/iFIX-Secure-Deployment-Guide?language=en_US",
"refsource": "MISC",
"name": "https://digitalsupport.ge.com/s/article/iFIX-Secure-Deployment-Guide?language=en_US"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n<span style=\"background-color: rgb(255, 255, 255);\">Also, users are strongly advised to refer to the Secure Deployment Guide (SDG) instructions on how to set-up and configure Access Control List (ACLs). The complete SDG can be found </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://digitalsupport.ge.com/s/article/iFIX-Secure-Deployment-Guide?language=en_US\">here</a><span style=\"background-color: rgb(255, 255, 255);\">. &nbsp;</span>\n\n<br>"
}
],
"value": "\nAlso, users are strongly advised to refer to the Secure Deployment Guide (SDG) instructions on how to set-up and configure Access Control List (ACLs). The complete SDG can be found here https://digitalsupport.ge.com/s/article/iFIX-Secure-Deployment-Guide . \u00a0\n\n\n"
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n<p>GE Digital recommends that users upgrade to Proficy iFIX 2023. GE Digital recommends that any users choosing not to upgrade at this time apply the Simulation Drivers (SIMs) provided below to their earlier GE Digital Proficy iFIX versions (login required): </p><ul><li>iFIX 2023 - select \u201cDownload Software Updates\u201d: <ul><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://digitalsupport.ge.com/s/article/iFIX2022-WebSecurity-001?language=en_US\">iFIX 2022 SIM</a>&nbsp; </li><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://digitalsupport.ge.com/s/article/iFIX61-WebSecurity-001?language=en_US\">iFIX v6.1 SIM</a>&nbsp; </li><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://digitalsupport.ge.com/s/article/iFIX65-WebSecurity-001?language=en_US\">iFIX v6.5 SIM</a>&nbsp;</li></ul></li></ul>\n\n<br>"
}
],
"value": "\nGE Digital recommends that users upgrade to Proficy iFIX 2023. GE Digital recommends that any users choosing not to upgrade at this time apply the Simulation Drivers (SIMs) provided below to their earlier GE Digital Proficy iFIX versions (login required): \n\n * iFIX 2023 - select \u201cDownload Software Updates\u201d: * iFIX 2022 SIM https://digitalsupport.ge.com/s/article/iFIX2022-WebSecurity-001 \u00a0 \n * iFIX v6.1 SIM https://digitalsupport.ge.com/s/article/iFIX61-WebSecurity-001 \u00a0 \n * iFIX v6.5 SIM https://digitalsupport.ge.com/s/article/iFIX65-WebSecurity-001 \u00a0\n\n\n\n\n\n\n\n\n"
}
],
"credits": [
{
"lang": "en",
"value": "Michael Heinzl reported this vulnerability to CISA. "
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
]
}