ID

VAR-201401-0365


CVE

CVE-2014-0751


TITLE

GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY and Proficy Process Systems with CIMPLICITY Vulnerable to directory traversal

Trust: 0.8

sources: JVNDB: JVNDB-2014-001258

DESCRIPTION

The CIMPLICITY Web-based access component, CimWebServer, does not check the location of shell files being loaded into the system. By modifying the source location, an attacker could send shell code to the CimWebServer which would deploy the nefarious files as part of any SCADA project. This could allow the attacker to execute arbitrary code. GE Intelligent Platforms Proficy HMI/SCADA - CIMPLICITY and Proficy Process Systems with CIMPLICITY of CimWebServer.exe ( alias WebView component ) Contains a directory traversal vulnerability. Zero Day Initiative Is vulnerable to this vulnerability ZDI-CAN-1623 Was numbered.By a third party TCP port 10212 Arbitrary code could be executed via a crafted message to. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CimWebServer component. This component performs insufficient parameter validation on the szScreen field. GE Proficy CIMPLICITY is a monitoring software developed by GE and one of the industry's leading HMI/SCADA software. The following products are affected: Proficy HMI/SCADA - CIMPLICITY 4.01 through versions 8.2 Proficy Process Systems with CIMPLICITY

Trust: 3.24

sources: NVD: CVE-2014-0751 // JVNDB: JVNDB-2014-001258 // ZDI: ZDI-14-016 // CNVD: CNVD-2014-00675 // BID: 65117 // IVD: 4369d8b8-2352-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: 4369d8b8-2352-11e6-abef-000c29c66e3d // CNVD: CNVD-2014-00675

AFFECTED PRODUCTS

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:7.5

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:8.0

Trust: 1.6

vendor:gemodel:intelligent platforms proficy process systems with cimplicityscope:eqversion: -

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:4.01

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:8.2

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\/scada cimplicityscope:eqversion:8.1

Trust: 1.6

vendor:gemodel:intelligent platforms proficy hmi\%2fscada cimplicityscope:lteversion:8.2

Trust: 1.0

vendor:general electricmodel:proficy hmi/scada - cimplicityscope:eqversion:4.01 to 8.2

Trust: 0.8

vendor:general electricmodel:proficy process systems with cimplicityscope: - version: -

Trust: 0.8

vendor:gemodel:proficy cimplicityscope: - version: -

Trust: 0.7

vendor:generalmodel:electric proficy process systems with cimplicityscope: - version: -

Trust: 0.6

vendor:generalmodel:electric proficy hmi/scada \342\200\223 cimplicityscope:eqversion:4.01-8.2

Trust: 0.6

vendor:gemodel:intelligent platforms proficy hmi\%2fscada cimplicityscope:eqversion:8.2

Trust: 0.6

vendor:intelligent platforms proficy hmi 2fscada cimplicitymodel: - scope:eqversion:*

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:4.01

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:7.5

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:8.0

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:8.1

Trust: 0.2

vendor:intelligent platforms proficy hmi scada cimplicitymodel: - scope:eqversion:8.2

Trust: 0.2

vendor:intelligent platforms proficy process with cimplicitymodel: - scope:eqversion: -

Trust: 0.2

sources: IVD: 4369d8b8-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-016 // CNVD: CNVD-2014-00675 // JVNDB: JVNDB-2014-001258 // CNNVD: CNNVD-201401-524 // NVD: CVE-2014-0751

CVSS

SEVERITY

CVSSV2

CVSSV3

ics-cert@hq.dhs.gov: CVE-2014-0751
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2014-0751
value: HIGH

Trust: 1.0

NVD: CVE-2014-0751
value: HIGH

Trust: 0.8

ZDI: CVE-2014-0751
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2014-00675
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201401-524
value: HIGH

Trust: 0.6

IVD: 4369d8b8-2352-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2014-0751
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ics-cert@hq.dhs.gov: CVE-2014-0751
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.7

CNVD: CNVD-2014-00675
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 4369d8b8-2352-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 4369d8b8-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-016 // CNVD: CNVD-2014-00675 // JVNDB: JVNDB-2014-001258 // CNNVD: CNNVD-201401-524 // NVD: CVE-2014-0751 // NVD: CVE-2014-0751

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.8

sources: JVNDB: JVNDB-2014-001258 // NVD: CVE-2014-0751

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201401-524

TYPE

Path traversal

Trust: 0.8

sources: IVD: 4369d8b8-2352-11e6-abef-000c29c66e3d // CNNVD: CNNVD-201401-524

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001258

PATCH

title:KB15940url:http://support.ge-ip.com/support/index?page=kbchannel&id=KB15940

Trust: 0.8

title:GE has issued an update to correct this vulnerability.url:http://ics-cert.us-cert.gov/advisories/ICSA-14-023-01

Trust: 0.7

title:Multiple General Electric product shell upload vulnerability patchesurl:https://www.cnvd.org.cn/patchInfo/show/43199

Trust: 0.6

sources: ZDI: ZDI-14-016 // CNVD: CNVD-2014-00675 // JVNDB: JVNDB-2014-001258

EXTERNAL IDS

db:NVDid:CVE-2014-0751

Trust: 4.2

db:ICS CERTid:ICSA-14-023-01

Trust: 3.0

db:BIDid:65117

Trust: 1.9

db:BIDid:65124

Trust: 1.0

db:CNVDid:CNVD-2014-00675

Trust: 0.8

db:CNNVDid:CNNVD-201401-524

Trust: 0.8

db:JVNDBid:JVNDB-2014-001258

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-1623

Trust: 0.7

db:ZDIid:ZDI-14-016

Trust: 0.7

db:IVDid:4369D8B8-2352-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 4369d8b8-2352-11e6-abef-000c29c66e3d // ZDI: ZDI-14-016 // CNVD: CNVD-2014-00675 // BID: 65117 // JVNDB: JVNDB-2014-001258 // CNNVD: CNNVD-201401-524 // NVD: CVE-2014-0751

REFERENCES

url:http://ics-cert.us-cert.gov/advisories/icsa-14-023-01

Trust: 3.7

url:http://support.ge-ip.com/support/index?page=kbchannel&id=kb15940

Trust: 1.6

url:http://www.securityfocus.com/bid/65124

Trust: 1.0

url:https://www.cisa.gov/news-events/ics-advisories/icsa-14-023-01

Trust: 1.0

url:http://www.securityfocus.com/bid/65117

Trust: 1.0

url:http://support.ge-ip.com/support/index?page=kbchannel&id=kb15939

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0751

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0751

Trust: 0.8

sources: ZDI: ZDI-14-016 // CNVD: CNVD-2014-00675 // JVNDB: JVNDB-2014-001258 // CNNVD: CNNVD-201401-524 // NVD: CVE-2014-0751

CREDITS

ZombiE and amisto0x07

Trust: 0.7

sources: ZDI: ZDI-14-016

SOURCES

db:IVDid:4369d8b8-2352-11e6-abef-000c29c66e3d
db:ZDIid:ZDI-14-016
db:CNVDid:CNVD-2014-00675
db:BIDid:65117
db:JVNDBid:JVNDB-2014-001258
db:CNNVDid:CNNVD-201401-524
db:NVDid:CVE-2014-0751

LAST UPDATE DATE

2025-08-24T23:08:30.083000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-14-016date:2014-02-13T00:00:00
db:CNVDid:CNVD-2014-00675date:2014-01-28T00:00:00
db:BIDid:65117date:2014-02-17T03:56:00
db:JVNDBid:JVNDB-2014-001258date:2014-01-28T00:00:00
db:CNNVDid:CNNVD-201401-524date:2014-01-28T00:00:00
db:NVDid:CVE-2014-0751date:2025-08-22T23:15:30.233

SOURCES RELEASE DATE

db:IVDid:4369d8b8-2352-11e6-abef-000c29c66e3ddate:2014-01-28T00:00:00
db:ZDIid:ZDI-14-016date:2014-02-13T00:00:00
db:CNVDid:CNVD-2014-00675date:2014-01-28T00:00:00
db:BIDid:65117date:2014-01-23T00:00:00
db:JVNDBid:JVNDB-2014-001258date:2014-01-28T00:00:00
db:CNNVDid:CNNVD-201401-524date:2014-01-28T00:00:00
db:NVDid:CVE-2014-0751date:2014-01-25T22:55:04.583