Zero-day Vulnerability Database

Change view:

Zero-day vulnerabilities discovered: 1

Remote code execution in GE Proficy CIMPLICITY HMI
CVE-2014-0751

Improper access control

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to improper access control and incorrect validation of the szScreen field when processing file uploads within the CimWebServer component. A remote unauthenticated attacker can upload and execute arbitrary file on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Note: this vulnerability has been exploited in targeted attacks.

i

According to ICS-CERT, the vulnerability has been exploited in the wild since at least since January 2012. The vulnerability has been exploited in Sandworm campaign.

Software: CIMPLICITY

Known/fameous malware:

BlackEnergy

According to ICS-CERT, the vulnerability has been exploited in the wild since at least since January 2012. The vulnerability has been exploited in Sandworm campaign.

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.