Zero-day vulnerability in CIMPLICITY

Improper access control

According to ICS-CERT, the vulnerability has been exploited in the wild since at least since January 2012. The vulnerability has been exploited in Sandworm campaign.

Known malware:


Vulnerability details

Advisory: SB2014021401 - Remote code execution in GE Proficy CIMPLICITY HMI

Vulnerable component: CIMPLICITY

CVE-ID: CVE-2014-0751

CVSSv3 score: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C

CWE-ID: CWE-284 - Improper Access Control


The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to improper access control and incorrect validation of the szScreen field when processing file uploads within the CimWebServer component. A remote unauthenticated attacker can upload and execute arbitrary file on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Note: this vulnerability has been exploited in targeted attacks.

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.