GE Digital CIMPLICITY
GE CIMPLICITY contains a memory corruption vulnerability (CWE-122) that could allow code execution if an authenticated local user opens a specially crafted document. The vulnerability affects all versions of CIMPLICITY. It is not exploitable remotely and requires the user to have valid credentials and local access to the affected system, then be socially engineered into opening a malicious file. No public exploits exist, and GE has not released a vendor fix; mitigation relies on user training, access controls, and secure deployment practices.
- Valid local user credentials on the CIMPLICITY workstation
- Physical or remote desktop access to the CIMPLICITY system
- Social engineering or phishing to convince an authorized user to open a malicious document
- The target user must actually open/execute the malicious file
Patching may require device reboot — plan for process interruption
/api/v1/advisories/59398892-4be8-4433-9c6f-963c5ab7d964Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.