All versions of GE Digital CIMPLICITY that are not adhering to SDG guidance and accepting documents from untrusted sources are vulnerable to memory corruption issues due to insufficient input validation, including issues such as out-of-bounds reads and writes, use-after-free, stack-based buffer overflows, uninitialized pointers, and a heap-based buffer overflow. Successful exploitation could allow an attacker to execute arbitrary code.
History

Mon, 21 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2023-07-19T13:40:22.326Z

Updated: 2024-10-21T18:16:08.986Z

Reserved: 2023-06-29T19:23:17.313Z

Link: CVE-2023-3463

cve-icon Vulnrichment

Updated: 2024-08-02T06:55:03.573Z

cve-icon NVD

Status : Modified

Published: 2023-07-19T14:15:10.620

Modified: 2024-11-21T08:17:19.300

Link: CVE-2023-3463

cve-icon Redhat

No data.