Vulnerability Note VU#308556

GE Fanuc CIMPLICITY HMI heap buffer overflow

Original Release date: 25 Jan 2008 | Last revised: 25 Jan 2008


GE Fanuc CIMPLICITY HMI contains a remotely accessible heap buffer overflow vulnerability which may allow a remote attacker to execute arbitrary code.


GE Fanuc CIMPLICITY HMI is software used for monitoring and control in Supervisory Control And Data Acquisition (SCADA) systems. A heap buffer overflow vulnerability exists in a CIMPLICITY process (w32rtr.exe) that listens on the network (32000/tcp). The vulnerable process exists in both servers and clients. An attacker could exploit this vulnerability by sending a specially crafted packet to a vulnerable CIMPLICITY system.

Note that this vulnerability affects GE Fanuc CIMPLICITY HMI versions up to and including version 7.0.


A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service.


Apply Patch

This vulnerability is addressed in CIMPLICITY 6.1 SP6 Hot fix - 010708_162517_6106 and CIMPLICITY 7.0 SIM 9. CIMPLICITY customers should refer to GE Fanuc knowledge base article KB2458 for more information.


Users of affected software with versions older than 6.1 are encouraged to upgrade to 6.1 or greater and then apply the patches described above. CIMPLICITY customers should refer to GE Fanuc knowledge base article KB12458 for more information.

Restrict Access

Restrict network access to hosts that require connections to CIMPLICITY. Do not allow access to CIMPLICITY from untrusted networks such as the internet.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
GE FanucAffected20 Dec 200724 Jan 2008
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported by Eyal Udassin of C4 Security.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2008-0176
  • Date Public: 24 Jan 2008
  • Date First Published: 25 Jan 2008
  • Date Last Updated: 25 Jan 2008
  • Severity Metric: 3.01
  • Document Revision: 32


If you have feedback, comments, or additional information about this vulnerability, please send us email.