Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Generic)  >   Proficy Vendors:   General Electric Company
Proficy Default Login Method Does Not Encrypt User Passwords
SecurityTracker Alert ID:  1019273
SecurityTracker URL:
CVE Reference:   CVE-2008-0174   (Links to External Site)
Date:  Jan 26 2008
Impact:   Disclosure of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2.6, possibly prior versions
Description:   A vulnerability was reported in Proficy. A remote user monitoring the network can obtain user authentication data.

The system sends usernames and passwords in clear text (using the HTTP Basic authentication method). A remote user monitoring the network between the target user's browser and the target system can obtain user authentication data.

Eyal Udassin of C4 reported this vulnerability.

Impact:   A remote user monitoring the network can obtain user authentication data.
Solution:   The vendor recommends using Windows-based authentication or SSL.

The GE advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  

Message History:   None.

 Source Message Contents

Date:  Fri, 25 Jan 2008 12:38:27 -0500
Subject:  C4 Security Advisory - GE Fanuc Proficy Information Portal 2.6 Authentication Vulnerability

GE-Fanuc's Proficy Information Portal 2.6 is a web based reporting
application for the SCADA environment. As such it will usually be installed
in a buffer zone between the SCADA and the corporate network, which makes it
a very sensitive application as it can access both networks.
The login process of Proficy involves sending the username in cleartext and
the password in Base64 encoded format. This transmition can potentially be
intercepted and decoded by an attacker with access to the data traffic.
An attacker can harvest user credentials by intercepting the traffic between
the browser and the Proficy server.
Affected Versions
Proficy Information Portal 2.6
Previous versions may be vulnerable, as they were not tested.
The vendor issued a KB article on how to resolve this vulnerability at the
GE-Fanuc website, yet the proposed solution was not verified by C4.
Additional Information
For additional information please contact us at Note
that we will respond only to verified utility personnel and governmental
The CVE identifier assigned to this vulnerability by CERT is CVE-2008-0174
This vulnerability was discovered by Eyal Udassin of C4.
Eyal Udassin - C4 (Formerly Swift Coders)
33 Jabotinsky St. The Twin Towers #1, Ramat Gan, Israel /


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2015, LLC