TippingPoint Zero Day Initiative

GE Proficy Real-Time Information Portal Remote Interface Service Remote Code Execution Vulnerability

ZDI-12-148: August 22nd, 2012


CVSS Score

Affected Vendors

Affected Products

    Proficy Real-Time Information Portal

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 11491. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of GE Proficy Real-Time Information Portal. Authentication is not required to exploit this vulnerability.

This specific flaw exists within the Remote Interface Service (rifsrvd.exe). The Remote Interface Service listens on TCP port 5159 by default. The process does not sufficiently validate two input strings that are used to create a configuration file on the server. Remote, unauthenticated attackers can exploit this vulnerability by sending malformed ID_SAVE_SRVC_CFG message packets to the target, which could ultimately lead to remote code execution under the context of the SYSTEM user.

Vendor Response

GE has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2011-10-17 - Vulnerability reported to vendor
    2012-08-22 - Coordinated public release of advisory


This vulnerability was discovered by:
    Luigi Auriemma