iFIX users with versions earlier than Version 5.5 who cannot upgrade can call GE Support. GE has released a new version of the HMI/SCADA iFIX software, Version 5.5. GE has released a new version of the HMI/SCADA iFIX 5.8 SIM 14:
GE has released a new version of the Historian software, Version 5.5 SIM 37: GE has released new versions of the Historian software, Version 6.0 SIM 9 (Standard and Enterprise): Contact information for GE is available at the following location: GE has also released a new version of the CIMPLICITY software, Version 9.5, and the Historian, Version 7.0, which are available by contacting a GE Digital representative. GE has released the iFIX software, Version 5.8 SIM 14, which is available at the following location with a valid account:
GE has released new product versions with new product names to address the identified vulnerability in the affected products.
DIFFICULTYĪn attacker with high skill would be able to exploit this vulnerability. No known public exploits specifically target this vulnerability. This vulnerability is not exploitable remotely and cannot be exploited without user interaction. A CVSS v3 base score of 6.4 has been assigned the CVSS vector string is (AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:L). VULNERABILITY CHARACTERIZATION VULNERABILITY OVERVIEWĪn attacker may be able to retrieve user passwords if he or she has access to an authenticated session. GE estimates that these products are used worldwide. They are sold by GE Digital, GE’s Automation and Control business, and by GE’s resellers and distributors. According to GE, these products are deployed across multiple sectors worldwide. Proficy Historian is a data historian that collects, archives, and distributes production information. Proficy HMI/SCADA-CIMPLICITY is a client/server-based HMI/SCADA application. The affected product, Proficy HMI/SCADA iFIX, is a HMI/SCADA application. GE is a US-based company that maintains offices in several countries around the world. NCCIC/ICS-CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation. Impact to individual organizations depends on many factors that are unique to each organization. Successful exploitation of this vulnerability may allow an attacker to retrieve user passwords.