Filtered by vendor Ge
Subscriptions
Total
128 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-5909 | 4 Ge, Ptc, Rockwellautomation and 1 more | 8 Industrial Gateway Server, Keepserverex, Opc-aggregator and 5 more | 2024-11-21 | 7.5 High |
KEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect. | ||||
CVE-2023-5908 | 4 Ge, Ptc, Rockwellautomation and 1 more | 8 Industrial Gateway Server, Keepserverex, Opc-aggregator and 5 more | 2024-11-21 | 9.1 Critical |
KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information. | ||||
CVE-2023-4487 | 1 Ge | 1 Cimplicity | 2024-11-21 | 7.8 High |
GE CIMPLICITY 2023 is by a process control vulnerability, which could allow a local attacker to insert malicious configuration files in the expected web server execution path to escalate privileges and gain full control of the HMI software. | ||||
CVE-2023-3463 | 1 Ge | 1 Cimplicity | 2024-11-21 | 6.6 Medium |
All versions of GE Digital CIMPLICITY that are not adhering to SDG guidance and accepting documents from untrusted sources are vulnerable to memory corruption issues due to insufficient input validation, including issues such as out-of-bounds reads and writes, use-after-free, stack-based buffer overflows, uninitialized pointers, and a heap-based buffer overflow. Successful exploitation could allow an attacker to execute arbitrary code. | ||||
CVE-2023-1552 | 1 Ge | 1 Toolboxst | 2024-11-21 | 6.4 Medium |
ToolboxST prior to version 7.10 is affected by a deserialization vulnerability. An attacker with local access to an HMI or who has conducted a social engineering attack on an authorized operator could execute code in a Toolbox user's context through the deserialization of an untrusted configuration file. Two CVSS scores have been provided to capture the differences between the two aforementioned attack vectors. Customers are advised to update to ToolboxST 7.10 which can be found in ControlST 7.10. If unable to update at this time customers should ensure they are following the guidance laid out in GE Gas Power's Secure Deployment Guide (GEH-6839). Customers should ensure they are not running ToolboxST as an Administrative user. | ||||
CVE-2023-0898 | 1 Ge | 1 Micom S1 Agile | 2024-11-21 | 5.3 Medium |
General Electric MiCOM S1 Agile is vulnerable to an attacker achieving code execution by placing malicious DLL files in the directory of the application. | ||||
CVE-2023-0755 | 3 Ge, Ptc, Rockwellautomation | 9 Digital Industrial Gateway Server, Kepware Server, Kepware Serverex and 6 more | 2024-11-21 | 9.8 Critical |
The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code. | ||||
CVE-2023-0754 | 3 Ge, Ptc, Rockwellautomation | 9 Digital Industrial Gateway Server, Kepware Server, Kepware Serverex and 6 more | 2024-11-21 | 9.8 Critical |
The affected products are vulnerable to an integer overflow or wraparound, which could allow an attacker to crash the server and remotely execute arbitrary code. | ||||
CVE-2023-0598 | 1 Ge | 1 Ifix | 2024-11-21 | 7.8 High |
GE Digital Proficy iFIX 2022, GE Digital Proficy iFIX v6.1, and GE Digital Proficy iFIX v6.5 are vulnerable to code injection, which may allow an attacker to insert malicious configuration files in the expected web server execution path and gain full control of the HMI software. | ||||
CVE-2022-46732 | 1 Ge | 1 Proficy Historian | 2024-11-21 | 9.8 Critical |
Even if the authentication fails for local service authentication, the requested command could still execute regardless of authentication status. | ||||
CVE-2022-46660 | 1 Ge | 1 Proficy Historian | 2024-11-21 | 7.5 High |
An unauthorized user could alter or write files with full control over the path and content of the file. | ||||
CVE-2022-46331 | 1 Ge | 1 Proficy Historian | 2024-11-21 | 7.5 High |
An unauthorized user could possibly delete any file on the system. | ||||
CVE-2022-43977 | 1 Ge | 2 Ms 3000, Ms 3000 Firmware | 2024-11-21 | 9.8 Critical |
An issue was discovered on GE Grid Solutions MS3000 devices before 3.7.6.25p0_3.2.2.17p0_4.7p0. The debug port accessible via TCP (a qconn service) lacks access control. | ||||
CVE-2022-43976 | 1 Ge | 2 Ms 3000, Ms 3000 Firmware | 2024-11-21 | 9.8 Critical |
An issue was discovered in FC46-WebBridge on GE Grid Solutions MS3000 devices before 3.7.6.25p0_3.2.2.17p0_4.7p0. Direct access to the API is possible on TCP port 8888 via programs located in the cgi-bin folder without any authentication. | ||||
CVE-2022-43975 | 1 Ge | 2 Ms 3000, Ms 3000 Firmware | 2024-11-21 | 7.5 High |
An issue was discovered in FC46-WebBridge on GE Grid Solutions MS3000 devices before 3.7.6.25p0_3.2.2.17p0_4.7p0. A vulnerability in the web server allows arbitrary files and configurations to be read via directory traversal over TCP port 8888. | ||||
CVE-2022-43494 | 1 Ge | 1 Proficy Historian | 2024-11-21 | 7.5 High |
An unauthorized user could be able to read any file on the system, potentially exposing sensitive information. | ||||
CVE-2022-3092 | 1 Ge | 1 Cimplicity | 2024-11-21 | 7.8 High |
GE CIMPICITY versions 2022 and prior is vulnerable to an out-of-bounds write, which could allow an attacker to execute arbitrary code. | ||||
CVE-2022-3084 | 1 Ge | 1 Cimplicity | 2024-11-21 | 7.8 High |
GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary code. | ||||
CVE-2022-38469 | 1 Ge | 1 Proficy Historian | 2024-11-21 | 7.5 High |
An unauthorized user with network access and the decryption key could decrypt sensitive data, such as usernames and passwords. | ||||
CVE-2022-37953 | 1 Ge | 1 Workstationst | 2024-11-21 | 4.7 Medium |
An HTTP response splitting vulnerability exists in the AM Gateway Challenge-Response dialog of WorkstationST (<v07.09.15) and could allow an attacker to compromise a victim's browser/session. WorkstationST is only deployed in specific, controlled environments rendering attack complexity significantly higher than if the attack were conducted on the software in isolation. WorkstationST v07.09.15 can be found in ControlST v07.09.07 SP8 and greater. |