OTPulse

GE Proficy Vulnerabilities

Act NowICS-CERT ICSA-14-023-01Oct 26, 2014
Summary

GE Proficy HMI/SCADA CIMPLICITY contains a path traversal vulnerability (CWE-22) that allows unauthenticated attackers to read or write arbitrary files on the affected system. The vulnerability affects CIMPLICITY versions 4.01 through 8.2 and all versions of Proficy Process Systems using CIMPLICITY. No vendor patch is available for this vulnerability.

What this means
What could happen
An attacker with network access to GE Proficy CIMPLICITY can manipulate file paths to read or write arbitrary files on the HMI/SCADA server, potentially allowing them to alter process configurations, steal operational data, or disrupt monitoring and control functions.
Who's at risk
Energy utilities and manufacturing facilities using GE Proficy CIMPLICITY HMI/SCADA systems for process monitoring and control. This affects all versions of CIMPLICITY between 4.01 and 8.2, and all versions of Proficy Process Systems using CIMPLICITY.
How it could be exploited
An attacker sends a crafted request to the CIMPLICITY interface that includes path traversal sequences (e.g., ../ or similar directory navigation) to access files outside the intended directory. The server does not properly validate the file path, allowing the attacker to read sensitive configuration files or write malicious files to critical locations on the system.
Prerequisites
  • Network access to the CIMPLICITY HMI/SCADA interface (typically port 80 or 443)
  • No authentication required for file path manipulation
remotely exploitableno authentication requiredlow complexityhigh EPSS score (37.6%)no patch availableaffects SCADA/HMI systems
Exploitability
High exploit probability (EPSS 37.6%)
Affected products (2)
2 EOL
ProductAffected VersionsFix Status
Proficy HMI/SCADA - CIMPLICITY: >=4.01|<=8.2≥ 4.01|≤ 8.2No fix (EOL)
Proficy Process Systems with CIMPLICITY: vers:all/*All versionsNo fix (EOL)
Remediation & Mitigation
0/4
Do now
0/2
HARDENINGImplement strict network segmentation to restrict access to CIMPLICITY interfaces from only authorized engineering and operations networks
WORKAROUNDDeploy a Web Application Firewall (WAF) or proxy to filter requests containing path traversal patterns (../, ..\ or similar sequences) before they reach the CIMPLICITY server
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

HARDENINGImplement file integrity monitoring on the CIMPLICITY server to detect unauthorized file modifications
HARDENINGEstablish comprehensive network access controls and monitoring to detect suspicious file access patterns
↑↓ Navigate · Esc Close
API: /api/v1/advisories/1d848289-f7d8-45ec-80c2-0b31c7b33500