- What is the severity of CVE-2022-23921?
- CVE-2022-23921 has been scored as a high severity vulnerability.
- How to fix CVE-2022-23921?
- To fix CVE-2022-23921: GE Digital recommends users upgrade all instances of the affected software to GE Digital’s Proficy CIMPLICITY, released January 2022 (Upgrade) and follow the instructions in the Secure Deployment Guide to restrict which CIMPLICITY projects are allowed to run. The upgrade contains what GE believes are mitigation measures to help ensure the vulnerability cannot be exploited. Users are encouraged to contact a GE Digital representative for the latest versions of the update. For users who choose to not implement the upgrade, GE Digital recommends applying the instructions in CIMPLICITY’s Secure Deployment Guide to ensure access to the CIMPLICITY machines and directories are properly controlled via access control limits.
- Is CVE-2022-23921 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2022-23921 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2022-23921?
- CVE-2022-23921 affects General Electric Proficy CIMPLICITY.