The affected product is vulnerable due to cleartext transmission of credentials seen in the CIMPLICITY network, which can be easily spoofed and used to log in to make operational changes to the system.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-26961 The affected product is vulnerable due to cleartext transmission of credentials seen in the CIMPLICITY network, which can be easily spoofed and used to log in to make operational changes to the system.
Fixes

Solution

Users are advised to refer to the Secure Deployment Guide on how to configure communication encryption. Users are encouraged to review the CIMPLICITY Windows Hardening Guide and Recommendations for further IPSEC configuration guidance found in the section titled “Appendix A IPSEC Configuration.” Users are encouraged to contact a GE representative to obtain the latest versions of CIMPLICITY.


Workaround

No workaround given by the vendor.

History

Wed, 16 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T18:00:26.255Z

Reserved: 2022-01-27T00:00:00.000Z

Link: CVE-2022-21798

cve-icon Vulnrichment

Updated: 2024-08-03T02:53:36.261Z

cve-icon NVD

Status : Modified

Published: 2022-02-25T19:15:23.723

Modified: 2024-11-21T06:45:27.413

Link: CVE-2022-21798

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.