Multiple vulnerabilities in GE Digital Proficy Historian



Published: 2023-01-18
Risk High
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2022-46732
CVE-2022-46660
CVE-2022-43494
CVE-2022-46331
CVE-2022-38469
CWE-ID CWE-288
CWE-434
CWE-284
CWE-261
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Proficy Historian
Server applications / Other server solutions

Vendor GE Digital

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Authentication bypass using an alternate path or channel

EUVDB-ID: #VU71297

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-46732

CWE-ID: CWE-288 - Authentication Bypass Using an Alternate Path or Channel

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to authentication bypass using an alternate path or channel. A remote attacker can bypass authentication for the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Proficy Historian: 7.0

External links

http://digitalsupport.ge.com/s/article/GE-Digital-Product-Security-Advisory-GED-23-01
http://www.cisa.gov/uscert/ics/advisories/icsa-23-017-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Arbitrary file upload

EUVDB-ID: #VU71298

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-46660

CWE-ID: CWE-434 - Unrestricted Upload of File with Dangerous Type

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload. A remote attacker can upload a malicious file and execute it on the server.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Proficy Historian: 7.0

External links

http://digitalsupport.ge.com/s/article/GE-Digital-Product-Security-Advisory-GED-23-01
http://www.cisa.gov/uscert/ics/advisories/icsa-23-017-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper access control

EUVDB-ID: #VU71299

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-43494

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Proficy Historian: 7.0

External links

http://digitalsupport.ge.com/s/article/GE-Digital-Product-Security-Advisory-GED-23-01
http://www.cisa.gov/uscert/ics/advisories/icsa-23-017-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper access control

EUVDB-ID: #VU71300

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-46331

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and delete any file on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Proficy Historian: 7.0

External links

http://digitalsupport.ge.com/s/article/GE-Digital-Product-Security-Advisory-GED-23-01
http://www.cisa.gov/uscert/ics/advisories/icsa-23-017-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Weak Encoding for Password

EUVDB-ID: #VU71301

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-38469

CWE-ID: CWE-261 - Weak Cryptography for Passwords

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to weak encoding for password. A remote attacker with the decryption key can decrypt sensitive data, such as usernames and passwords.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Proficy Historian: 7.0

External links

http://digitalsupport.ge.com/s/article/GE-Digital-Product-Security-Advisory-GED-23-01
http://www.cisa.gov/uscert/ics/advisories/icsa-23-017-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###