4.4 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
6.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L
0.001 Low
EPSS
Percentile
29.6%
Proficy HMI/SCADA iFIX
Version: 5.8 SIM 13 and earlier
Proficy HMI/SCADA CIMPLICITY
Version: 9.0 and earlier
Proficy Historian
Version: 6.0 and earlier
Links:
https://www.ge.com/
Severity level: Medium
Impact: Information Disclosure
Access Vector: Local
CVSS v3:
Base Score: 6.4
Vector: (AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:L)
CVE: CVE-2016-9360
iFIX from GE Digital, formerly Proficy HMI/SCADA - iFIX, is the industrial automation system of choice for many applications, ranging from common HMI, as simple as manual data entry and validation, to complex SCADA, such as batch, filtration, and distributed alarm management.
CIMPLICITY from GE Digital (formerly Proficy HMI/SCADA - CIMPLICITY) provides client-server based visualization and control β from single machines to plant locations spanning the world β helping to manage operations and improve decision making.
Historian from GE Digital (formerly Proficy Historian) is a data management software. Historian optimizes asset and plant performance through time series industrial data collection and aggregation and connects to GE Digitalβs Predix-based cloud solutions like Asset Performance Management, Brilliant Manufacturing, and HMI and SCADA.
The specialists of the Positive Research center have detected an Information Disclosure vulnerability in GE Proficy HMI/SCADA iFIX, Proficy HMI/SCADA CIMPLICITY, and Proficy Historian.
Vulnerability due to insufficient protection of user credentials allows attackers to obtain user passwords.
Update your products to the latest version
05.08.2015 - Vendor gets vulnerability details
01.12.2016 - Vendor releases fixed version and details
18.01.2017 - Public disclosure
The vulnerability was detected by Ilya Karpov, Positive Research Center (Positive Technologies Company)
http://en.securitylab.ru/lab/PT-2016-41
https://ics-cert.us-cert.gov/advisories/ICSA-16-336-05
Reports on the vulnerabilities previously discovered by Positive Research:
<http://www.ptsecurity.com/ww-en/analytics/threatscape/>
<http://en.securitylab.ru/lab/>
4.4 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
6.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L
0.001 Low
EPSS
Percentile
29.6%