Vulnerabilites related to ge - multilin_d30
Vulnerability from fkie_nvd
Published
2022-03-23 20:15
Modified
2024-11-21 05:57
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
GE UR IED firmware versions prior to version 8.1x with “Basic” security variant does not allow the disabling of the “Factory Mode,” which is used for servicing the IED by a “Factory” user.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "971B98BB-125D-4D3F-8B54-09C6ECBEFC46", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEAC84B-ED36-4D41-8CDC-84B30294667F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0DD7078-54B7-4908-B041-C389601FFE54", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F9FE28C-1F33-4ECA-9004-B46912A1D8D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D29A9-8351-48E0-BFCF-21945F586C51", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14E4B7C-E38E-4877-9EB6-BE496CFBB8D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEDFEAA-FF6B-40AE-988D-96B37E6F7A15", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F2E81E6-B718-4809-8D30-3074B0FB7239", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6A8BC17-2B8A-4FCD-AED4-D60DBFA2CCAC", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFD919B5-753E-40A8-8B14-BD0BA28386C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3506446-AF0D-4AC4-8C0A-5616D27C267B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9226C470-365B-4CFF-B1FF-326EA82E9C16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E5D2F8-AA89-44E3-9316-E28357E525D8", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CFC93A6-7FAB-4057-A962-6A9C8F0FD3DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C86C0AEE-795B-45B1-A917-00A355EC25CD", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*", "matchCriteriaId": "B66B913C-6D8A-4B5E-92AF-0ABE67195C47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D151332D-37C7-4F7B-A30E-EB7F927B905D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*", "matchCriteriaId": "313C6A1D-B50A-40C5-8553-68F21DFEDDDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E9423B-F49D-4AF7-8275-3216D615F279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC9965C1-9B3C-4B8A-8643-43678B5A6643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2447F208-815E-44D2-91BC-7BFCFC85C977", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*", "matchCriteriaId": "20A13929-C8B5-49E0-9F5C-EA443413C584", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DE2725C-8778-479D-8743-F62B5763931D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF00D002-3C82-47B1-B585-DB91F33CEECC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34B1A2B8-B43B-4CCD-886A-0487C09E5279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F716F53-3AC6-41C6-A894-9712A8AFE58C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58A5CD1D-27C0-4D14-9FBE-A8C74BD9737B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BFF5085-6713-41FA-93D5-65AE4C8F8AD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0B3453A-1B71-4ADD-8AC3-5D5436EAD879", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5431E320-7E3A-4BD3-B33A-3345CF20B20D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80DE8022-6349-4E53-B97B-AFAD1685E40E", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*", "matchCriteriaId": "2217A440-FADD-40ED-A933-F3DBCF36E116", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51F57944-8FDB-4541-A6ED-BF6D40916786", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B7B0753-62C7-4972-AD22-FC3E31A5218F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B97E0654-4407-48CE-BC07-E2385E86B65A", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E75BD31-3057-42F4-BD1B-C68C797F39DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10F68AE0-E4FC-4357-A619-B0B990FDC708", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*", "matchCriteriaId": "314AA92C-5B56-475A-B65F-CF597CEBFB38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GE UR IED firmware versions prior to version 8.1x with \u201cBasic\u201d security variant does not allow the disabling of the \u201cFactory Mode,\u201d which is used for servicing the IED by a \u201cFactory\u201d user." }, { "lang": "es", "value": "GE UR IED versiones de firmware anteriores a versi\u00f3n 8.1x con la variante de seguridad \"Basic\" no permiten deshabilitar el \"Factory Mode\", que es usado para el mantenimiento del IED por parte de un usuario \"Factory\"" } ], "id": "CVE-2021-27426", "lastModified": "2024-11-21T05:57:57.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-23T20:15:08.473", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-453" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-23 20:15
Modified
2024-11-21 05:57
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
GE UR firmware versions prior to version 8.1x shares MODBUS memory map as part of the communications guide. GE was made aware a “Last-key pressed” MODBUS register can be used to gain unauthorized information.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "971B98BB-125D-4D3F-8B54-09C6ECBEFC46", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEAC84B-ED36-4D41-8CDC-84B30294667F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0DD7078-54B7-4908-B041-C389601FFE54", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F9FE28C-1F33-4ECA-9004-B46912A1D8D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D29A9-8351-48E0-BFCF-21945F586C51", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14E4B7C-E38E-4877-9EB6-BE496CFBB8D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEDFEAA-FF6B-40AE-988D-96B37E6F7A15", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F2E81E6-B718-4809-8D30-3074B0FB7239", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6A8BC17-2B8A-4FCD-AED4-D60DBFA2CCAC", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFD919B5-753E-40A8-8B14-BD0BA28386C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3506446-AF0D-4AC4-8C0A-5616D27C267B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9226C470-365B-4CFF-B1FF-326EA82E9C16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E5D2F8-AA89-44E3-9316-E28357E525D8", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CFC93A6-7FAB-4057-A962-6A9C8F0FD3DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C86C0AEE-795B-45B1-A917-00A355EC25CD", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*", "matchCriteriaId": "B66B913C-6D8A-4B5E-92AF-0ABE67195C47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D151332D-37C7-4F7B-A30E-EB7F927B905D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*", "matchCriteriaId": "313C6A1D-B50A-40C5-8553-68F21DFEDDDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E9423B-F49D-4AF7-8275-3216D615F279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC9965C1-9B3C-4B8A-8643-43678B5A6643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2447F208-815E-44D2-91BC-7BFCFC85C977", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*", "matchCriteriaId": "20A13929-C8B5-49E0-9F5C-EA443413C584", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DE2725C-8778-479D-8743-F62B5763931D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF00D002-3C82-47B1-B585-DB91F33CEECC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34B1A2B8-B43B-4CCD-886A-0487C09E5279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F716F53-3AC6-41C6-A894-9712A8AFE58C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58A5CD1D-27C0-4D14-9FBE-A8C74BD9737B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BFF5085-6713-41FA-93D5-65AE4C8F8AD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0B3453A-1B71-4ADD-8AC3-5D5436EAD879", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5431E320-7E3A-4BD3-B33A-3345CF20B20D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80DE8022-6349-4E53-B97B-AFAD1685E40E", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*", "matchCriteriaId": "2217A440-FADD-40ED-A933-F3DBCF36E116", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51F57944-8FDB-4541-A6ED-BF6D40916786", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B7B0753-62C7-4972-AD22-FC3E31A5218F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B97E0654-4407-48CE-BC07-E2385E86B65A", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E75BD31-3057-42F4-BD1B-C68C797F39DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10F68AE0-E4FC-4357-A619-B0B990FDC708", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*", "matchCriteriaId": "314AA92C-5B56-475A-B65F-CF597CEBFB38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GE UR firmware versions prior to version 8.1x shares MODBUS memory map as part of the communications guide. GE was made aware a \u201cLast-key pressed\u201d MODBUS register can be used to gain unauthorized information." }, { "lang": "es", "value": "GE UR versiones de firmware anteriores a versi\u00f3n 8.1x, comparten el mapa de memoria MODBUS como parte de la gu\u00eda de comunicaciones. GE se dio cuenta de que un registro MODBUS de \"\u00faltima tecla pulsada\" puede usarse para obtener informaci\u00f3n no autorizada" } ], "id": "CVE-2021-27424", "lastModified": "2024-11-21T05:57:57.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-23T20:15:08.417", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-23 20:15
Modified
2024-11-21 05:57
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Summary
GE UR firmware versions prior to version 8.1x web server task does not properly handle receipt of unsupported HTTP verbs, resulting in the web server becoming temporarily unresponsive after receiving a series of unsupported HTTP requests. When unresponsive, the web server is inaccessible. By itself, this is not particularly significant as the relay remains effective in all other functionality and communication channels.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "971B98BB-125D-4D3F-8B54-09C6ECBEFC46", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEAC84B-ED36-4D41-8CDC-84B30294667F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0DD7078-54B7-4908-B041-C389601FFE54", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F9FE28C-1F33-4ECA-9004-B46912A1D8D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D29A9-8351-48E0-BFCF-21945F586C51", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14E4B7C-E38E-4877-9EB6-BE496CFBB8D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEDFEAA-FF6B-40AE-988D-96B37E6F7A15", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F2E81E6-B718-4809-8D30-3074B0FB7239", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6A8BC17-2B8A-4FCD-AED4-D60DBFA2CCAC", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFD919B5-753E-40A8-8B14-BD0BA28386C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3506446-AF0D-4AC4-8C0A-5616D27C267B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9226C470-365B-4CFF-B1FF-326EA82E9C16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E5D2F8-AA89-44E3-9316-E28357E525D8", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CFC93A6-7FAB-4057-A962-6A9C8F0FD3DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C86C0AEE-795B-45B1-A917-00A355EC25CD", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*", "matchCriteriaId": "B66B913C-6D8A-4B5E-92AF-0ABE67195C47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D151332D-37C7-4F7B-A30E-EB7F927B905D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*", "matchCriteriaId": "313C6A1D-B50A-40C5-8553-68F21DFEDDDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E9423B-F49D-4AF7-8275-3216D615F279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC9965C1-9B3C-4B8A-8643-43678B5A6643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2447F208-815E-44D2-91BC-7BFCFC85C977", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*", "matchCriteriaId": "20A13929-C8B5-49E0-9F5C-EA443413C584", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DE2725C-8778-479D-8743-F62B5763931D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF00D002-3C82-47B1-B585-DB91F33CEECC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34B1A2B8-B43B-4CCD-886A-0487C09E5279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F716F53-3AC6-41C6-A894-9712A8AFE58C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58A5CD1D-27C0-4D14-9FBE-A8C74BD9737B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BFF5085-6713-41FA-93D5-65AE4C8F8AD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0B3453A-1B71-4ADD-8AC3-5D5436EAD879", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5431E320-7E3A-4BD3-B33A-3345CF20B20D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80DE8022-6349-4E53-B97B-AFAD1685E40E", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*", "matchCriteriaId": "2217A440-FADD-40ED-A933-F3DBCF36E116", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51F57944-8FDB-4541-A6ED-BF6D40916786", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B7B0753-62C7-4972-AD22-FC3E31A5218F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B97E0654-4407-48CE-BC07-E2385E86B65A", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E75BD31-3057-42F4-BD1B-C68C797F39DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10F68AE0-E4FC-4357-A619-B0B990FDC708", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*", "matchCriteriaId": "314AA92C-5B56-475A-B65F-CF597CEBFB38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GE UR firmware versions prior to version 8.1x web server task does not properly handle receipt of unsupported HTTP verbs, resulting in the web server becoming temporarily unresponsive after receiving a series of unsupported HTTP requests. When unresponsive, the web server is inaccessible. By itself, this is not particularly significant as the relay remains effective in all other functionality and communication channels." }, { "lang": "es", "value": "GE UR versiones de firmware anteriores a versi\u00f3n 8.1x, de la tarea del servidor web no manejan apropiadamente la recepci\u00f3n de verbos HTTP no admitidos, resultando en que el servidor web deje de responder temporalmente tras recibir una serie de peticiones HTTP no admitidas. Cuando no responde, el servidor web es inaccesible. Por s\u00ed mismo, esto no es particularmente significativo, ya que el rel\u00e9 sigue siendo efectivo en todas las dem\u00e1s funcionalidades y canales de comunicaci\u00f3n" } ], "id": "CVE-2021-27420", "lastModified": "2024-11-21T05:57:57.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-23T20:15:08.310", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-23 20:15
Modified
2024-11-21 05:57
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "971B98BB-125D-4D3F-8B54-09C6ECBEFC46", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEAC84B-ED36-4D41-8CDC-84B30294667F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0DD7078-54B7-4908-B041-C389601FFE54", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F9FE28C-1F33-4ECA-9004-B46912A1D8D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D29A9-8351-48E0-BFCF-21945F586C51", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14E4B7C-E38E-4877-9EB6-BE496CFBB8D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEDFEAA-FF6B-40AE-988D-96B37E6F7A15", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F2E81E6-B718-4809-8D30-3074B0FB7239", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6A8BC17-2B8A-4FCD-AED4-D60DBFA2CCAC", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFD919B5-753E-40A8-8B14-BD0BA28386C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3506446-AF0D-4AC4-8C0A-5616D27C267B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9226C470-365B-4CFF-B1FF-326EA82E9C16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E5D2F8-AA89-44E3-9316-E28357E525D8", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CFC93A6-7FAB-4057-A962-6A9C8F0FD3DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C86C0AEE-795B-45B1-A917-00A355EC25CD", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*", "matchCriteriaId": "B66B913C-6D8A-4B5E-92AF-0ABE67195C47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D151332D-37C7-4F7B-A30E-EB7F927B905D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*", "matchCriteriaId": "313C6A1D-B50A-40C5-8553-68F21DFEDDDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E9423B-F49D-4AF7-8275-3216D615F279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC9965C1-9B3C-4B8A-8643-43678B5A6643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2447F208-815E-44D2-91BC-7BFCFC85C977", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*", "matchCriteriaId": "20A13929-C8B5-49E0-9F5C-EA443413C584", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DE2725C-8778-479D-8743-F62B5763931D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF00D002-3C82-47B1-B585-DB91F33CEECC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34B1A2B8-B43B-4CCD-886A-0487C09E5279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F716F53-3AC6-41C6-A894-9712A8AFE58C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58A5CD1D-27C0-4D14-9FBE-A8C74BD9737B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BFF5085-6713-41FA-93D5-65AE4C8F8AD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0B3453A-1B71-4ADD-8AC3-5D5436EAD879", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5431E320-7E3A-4BD3-B33A-3345CF20B20D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80DE8022-6349-4E53-B97B-AFAD1685E40E", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*", "matchCriteriaId": "2217A440-FADD-40ED-A933-F3DBCF36E116", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51F57944-8FDB-4541-A6ED-BF6D40916786", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B7B0753-62C7-4972-AD22-FC3E31A5218F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B97E0654-4407-48CE-BC07-E2385E86B65A", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E75BD31-3057-42F4-BD1B-C68C797F39DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10F68AE0-E4FC-4357-A619-B0B990FDC708", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*", "matchCriteriaId": "314AA92C-5B56-475A-B65F-CF597CEBFB38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings." }, { "lang": "es", "value": "GE UR versiones de firmware anteriores a versi\u00f3n 8.1x, admiten la interfaz web con acceso de s\u00f3lo lectura. El dispositivo no comprueba correctamente la entrada del usuario, haciendo posible llevar a cabo ataques de tipo cross-site scripting, que pueden ser usados para enviar un script malicioso. Adem\u00e1s, el servidor web de UR Firmware no lleva a cabo la codificaci\u00f3n HTML de las cadenas suministradas por el usuario" } ], "id": "CVE-2021-27418", "lastModified": "2024-11-21T05:57:56.947", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-23T20:15:08.247", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-23 20:15
Modified
2024-11-21 05:57
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool – Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "971B98BB-125D-4D3F-8B54-09C6ECBEFC46", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEAC84B-ED36-4D41-8CDC-84B30294667F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0DD7078-54B7-4908-B041-C389601FFE54", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F9FE28C-1F33-4ECA-9004-B46912A1D8D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D29A9-8351-48E0-BFCF-21945F586C51", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14E4B7C-E38E-4877-9EB6-BE496CFBB8D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEDFEAA-FF6B-40AE-988D-96B37E6F7A15", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F2E81E6-B718-4809-8D30-3074B0FB7239", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6A8BC17-2B8A-4FCD-AED4-D60DBFA2CCAC", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFD919B5-753E-40A8-8B14-BD0BA28386C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3506446-AF0D-4AC4-8C0A-5616D27C267B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9226C470-365B-4CFF-B1FF-326EA82E9C16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E5D2F8-AA89-44E3-9316-E28357E525D8", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CFC93A6-7FAB-4057-A962-6A9C8F0FD3DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C86C0AEE-795B-45B1-A917-00A355EC25CD", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*", "matchCriteriaId": "B66B913C-6D8A-4B5E-92AF-0ABE67195C47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D151332D-37C7-4F7B-A30E-EB7F927B905D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*", "matchCriteriaId": "313C6A1D-B50A-40C5-8553-68F21DFEDDDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E9423B-F49D-4AF7-8275-3216D615F279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC9965C1-9B3C-4B8A-8643-43678B5A6643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2447F208-815E-44D2-91BC-7BFCFC85C977", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*", "matchCriteriaId": "20A13929-C8B5-49E0-9F5C-EA443413C584", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DE2725C-8778-479D-8743-F62B5763931D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF00D002-3C82-47B1-B585-DB91F33CEECC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34B1A2B8-B43B-4CCD-886A-0487C09E5279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F716F53-3AC6-41C6-A894-9712A8AFE58C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58A5CD1D-27C0-4D14-9FBE-A8C74BD9737B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BFF5085-6713-41FA-93D5-65AE4C8F8AD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0B3453A-1B71-4ADD-8AC3-5D5436EAD879", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5431E320-7E3A-4BD3-B33A-3345CF20B20D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80DE8022-6349-4E53-B97B-AFAD1685E40E", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*", "matchCriteriaId": "2217A440-FADD-40ED-A933-F3DBCF36E116", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51F57944-8FDB-4541-A6ED-BF6D40916786", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B7B0753-62C7-4972-AD22-FC3E31A5218F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B97E0654-4407-48CE-BC07-E2385E86B65A", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E75BD31-3057-42F4-BD1B-C68C797F39DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10F68AE0-E4FC-4357-A619-B0B990FDC708", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*", "matchCriteriaId": "314AA92C-5B56-475A-B65F-CF597CEBFB38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool \u2013 Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10." }, { "lang": "es", "value": "IED GE UR versiones de firmware anteriores a versi\u00f3n 8.1x, admiten la actualizaci\u00f3n del firmware mediante la herramienta de configuraci\u00f3n UR Setup - Enervista UR Setup. Esta herramienta UR Setup comprueba la autenticidad e integridad del archivo de firmware antes de cargar el IED UR. Un usuario no leg\u00edtimo podr\u00eda actualizar el firmware sin privilegios apropiados. Ha sido evaluada la debilidad y ha sido implementada una mitigaci\u00f3n en versi\u00f3n 8.10 del firmware" } ], "id": "CVE-2021-27428", "lastModified": "2024-11-21T05:57:58.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-23T20:15:08.527", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-23 20:15
Modified
2024-11-21 05:57
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
GE UR firmware versions prior to version 8.1x web server interface is supported on UR over HTTP protocol. It allows sensitive information exposure without authentication.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | Mitigation, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.gegridsolutions.com/Passport/Login.aspx | Permissions Required, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "971B98BB-125D-4D3F-8B54-09C6ECBEFC46", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEAC84B-ED36-4D41-8CDC-84B30294667F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0DD7078-54B7-4908-B041-C389601FFE54", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F9FE28C-1F33-4ECA-9004-B46912A1D8D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D29A9-8351-48E0-BFCF-21945F586C51", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14E4B7C-E38E-4877-9EB6-BE496CFBB8D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AEDFEAA-FF6B-40AE-988D-96B37E6F7A15", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F2E81E6-B718-4809-8D30-3074B0FB7239", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6A8BC17-2B8A-4FCD-AED4-D60DBFA2CCAC", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFD919B5-753E-40A8-8B14-BD0BA28386C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3506446-AF0D-4AC4-8C0A-5616D27C267B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*", "matchCriteriaId": "9226C470-365B-4CFF-B1FF-326EA82E9C16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E5D2F8-AA89-44E3-9316-E28357E525D8", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CFC93A6-7FAB-4057-A962-6A9C8F0FD3DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C86C0AEE-795B-45B1-A917-00A355EC25CD", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*", "matchCriteriaId": "B66B913C-6D8A-4B5E-92AF-0ABE67195C47", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D151332D-37C7-4F7B-A30E-EB7F927B905D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*", "matchCriteriaId": "313C6A1D-B50A-40C5-8553-68F21DFEDDDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E9423B-F49D-4AF7-8275-3216D615F279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC9965C1-9B3C-4B8A-8643-43678B5A6643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2447F208-815E-44D2-91BC-7BFCFC85C977", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*", "matchCriteriaId": "20A13929-C8B5-49E0-9F5C-EA443413C584", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DE2725C-8778-479D-8743-F62B5763931D", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF00D002-3C82-47B1-B585-DB91F33CEECC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34B1A2B8-B43B-4CCD-886A-0487C09E5279", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F716F53-3AC6-41C6-A894-9712A8AFE58C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58A5CD1D-27C0-4D14-9FBE-A8C74BD9737B", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BFF5085-6713-41FA-93D5-65AE4C8F8AD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0B3453A-1B71-4ADD-8AC3-5D5436EAD879", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5431E320-7E3A-4BD3-B33A-3345CF20B20D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80DE8022-6349-4E53-B97B-AFAD1685E40E", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*", "matchCriteriaId": "2217A440-FADD-40ED-A933-F3DBCF36E116", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51F57944-8FDB-4541-A6ED-BF6D40916786", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B7B0753-62C7-4972-AD22-FC3E31A5218F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B97E0654-4407-48CE-BC07-E2385E86B65A", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E75BD31-3057-42F4-BD1B-C68C797F39DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10F68AE0-E4FC-4357-A619-B0B990FDC708", "versionEndExcluding": "8.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*", "matchCriteriaId": "314AA92C-5B56-475A-B65F-CF597CEBFB38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GE UR firmware versions prior to version 8.1x web server interface is supported on UR over HTTP protocol. It allows sensitive information exposure without authentication." }, { "lang": "es", "value": "GE UR versiones de firmware anteriores a versi\u00f3n 8.1x, admiten la interfaz del servidor web en la UR a trav\u00e9s del protocolo HTTP. Permite una exposici\u00f3n de informaci\u00f3n confidencial sin autenticaci\u00f3n" } ], "id": "CVE-2021-27422", "lastModified": "2024-11-21T05:57:57.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-23T20:15:08.367", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2021-27426
Vulnerability from cvelistv5
Published
2022-03-23 19:46
Modified
2024-08-03 20:48
Severity ?
EPSS score ?
Summary
GE UR IED firmware versions prior to version 8.1x with “Basic” security variant does not allow the disabling of the “Factory Mode,” which is used for servicing the IED by a “Factory” user.
References
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | x_refsource_CONFIRM | |
https://www.gegridsolutions.com/Passport/Login.aspx | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:48:17.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "UR family", "vendor": "GE", "versions": [ { "lessThan": "8.1x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "descriptions": [ { "lang": "en", "value": "GE UR IED firmware versions prior to version 8.1x with \u201cBasic\u201d security variant does not allow the disabling of the \u201cFactory Mode,\u201d which is used for servicing the IED by a \u201cFactory\u201d user." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-453", "description": "CWE-453 Insecure Default Variable Initialization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-23T19:46:27", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "solutions": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "title": "GE UR family insecure default variable initialization", "workarounds": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27426", "STATE": "PUBLIC", "TITLE": "GE UR family insecure default variable initialization" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "UR family", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.1x" } ] } } ] }, "vendor_name": "GE" } ] } }, "credit": [ { "lang": "eng", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GE UR IED firmware versions prior to version 8.1x with \u201cBasic\u201d security variant does not allow the disabling of the \u201cFactory Mode,\u201d which is used for servicing the IED by a \u201cFactory\u201d user." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-453 Insecure Default Variable Initialization" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "name": "https://www.gegridsolutions.com/Passport/Login.aspx", "refsource": "CONFIRM", "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ] }, "solution": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27426", "datePublished": "2022-03-23T19:46:27", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T20:48:17.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27420
Vulnerability from cvelistv5
Published
2022-03-23 19:46
Modified
2024-08-03 20:48
Severity ?
EPSS score ?
Summary
GE UR firmware versions prior to version 8.1x web server task does not properly handle receipt of unsupported HTTP verbs, resulting in the web server becoming temporarily unresponsive after receiving a series of unsupported HTTP requests. When unresponsive, the web server is inaccessible. By itself, this is not particularly significant as the relay remains effective in all other functionality and communication channels.
References
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | x_refsource_CONFIRM | |
https://www.gegridsolutions.com/Passport/Login.aspx | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:48:17.154Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "UR family", "vendor": "GE", "versions": [ { "lessThan": "8.1x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "descriptions": [ { "lang": "en", "value": "GE UR firmware versions prior to version 8.1x web server task does not properly handle receipt of unsupported HTTP verbs, resulting in the web server becoming temporarily unresponsive after receiving a series of unsupported HTTP requests. When unresponsive, the web server is inaccessible. By itself, this is not particularly significant as the relay remains effective in all other functionality and communication channels." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-23T19:46:24", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "solutions": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "title": "GE UR family input validation", "workarounds": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27420", "STATE": "PUBLIC", "TITLE": "GE UR family input validation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "UR family", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.1x" } ] } } ] }, "vendor_name": "GE" } ] } }, "credit": [ { "lang": "eng", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GE UR firmware versions prior to version 8.1x web server task does not properly handle receipt of unsupported HTTP verbs, resulting in the web server becoming temporarily unresponsive after receiving a series of unsupported HTTP requests. When unresponsive, the web server is inaccessible. By itself, this is not particularly significant as the relay remains effective in all other functionality and communication channels." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "name": "https://www.gegridsolutions.com/Passport/Login.aspx", "refsource": "CONFIRM", "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ] }, "solution": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27420", "datePublished": "2022-03-23T19:46:24", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T20:48:17.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27424
Vulnerability from cvelistv5
Published
2022-03-23 19:46
Modified
2024-08-03 20:48
Severity ?
EPSS score ?
Summary
GE UR firmware versions prior to version 8.1x shares MODBUS memory map as part of the communications guide. GE was made aware a “Last-key pressed” MODBUS register can be used to gain unauthorized information.
References
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | x_refsource_CONFIRM | |
https://www.gegridsolutions.com/Passport/Login.aspx | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:48:17.121Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "UR family", "vendor": "GE", "versions": [ { "lessThan": "8.1x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "descriptions": [ { "lang": "en", "value": "GE UR firmware versions prior to version 8.1x shares MODBUS memory map as part of the communications guide. GE was made aware a \u201cLast-key pressed\u201d MODBUS register can be used to gain unauthorized information." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-23T19:46:25", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "solutions": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "title": "GE UR family exposure of sensitive information to an unauthorized actor", "workarounds": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27424", "STATE": "PUBLIC", "TITLE": "GE UR family exposure of sensitive information to an unauthorized actor" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "UR family", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.1x" } ] } } ] }, "vendor_name": "GE" } ] } }, "credit": [ { "lang": "eng", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GE UR firmware versions prior to version 8.1x shares MODBUS memory map as part of the communications guide. GE was made aware a \u201cLast-key pressed\u201d MODBUS register can be used to gain unauthorized information." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "name": "https://www.gegridsolutions.com/Passport/Login.aspx", "refsource": "CONFIRM", "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ] }, "solution": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27424", "datePublished": "2022-03-23T19:46:25", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T20:48:17.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27422
Vulnerability from cvelistv5
Published
2022-03-23 19:46
Modified
2024-08-03 20:48
Severity ?
EPSS score ?
Summary
GE UR firmware versions prior to version 8.1x web server interface is supported on UR over HTTP protocol. It allows sensitive information exposure without authentication.
References
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | x_refsource_CONFIRM | |
https://www.gegridsolutions.com/Passport/Login.aspx | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:48:17.116Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "UR family", "vendor": "GE", "versions": [ { "lessThan": "8.1x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "descriptions": [ { "lang": "en", "value": "GE UR firmware versions prior to version 8.1x web server interface is supported on UR over HTTP protocol. It allows sensitive information exposure without authentication." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-23T19:46:28", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "solutions": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "title": "GE UR family exposure of sensitive information to an unauthorized actor", "workarounds": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27422", "STATE": "PUBLIC", "TITLE": "GE UR family exposure of sensitive information to an unauthorized actor" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "UR family", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.1x" } ] } } ] }, "vendor_name": "GE" } ] } }, "credit": [ { "lang": "eng", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GE UR firmware versions prior to version 8.1x web server interface is supported on UR over HTTP protocol. It allows sensitive information exposure without authentication." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "name": "https://www.gegridsolutions.com/Passport/Login.aspx", "refsource": "CONFIRM", "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ] }, "solution": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27422", "datePublished": "2022-03-23T19:46:28", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T20:48:17.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27428
Vulnerability from cvelistv5
Published
2022-03-23 19:46
Modified
2024-08-03 20:48
Severity ?
EPSS score ?
Summary
GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool – Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10.
References
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | x_refsource_CONFIRM | |
https://www.gegridsolutions.com/Passport/Login.aspx | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:48:17.217Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "UR family", "vendor": "GE", "versions": [ { "lessThan": "8.1x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "descriptions": [ { "lang": "en", "value": "GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool \u2013 Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-23T19:46:25", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "solutions": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "title": "GE UR family Unrestricted Upload of File with Dangerous Type", "workarounds": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27428", "STATE": "PUBLIC", "TITLE": "GE UR family Unrestricted Upload of File with Dangerous Type" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "UR family", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.1x" } ] } } ] }, "vendor_name": "GE" } ] } }, "credit": [ { "lang": "eng", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool \u2013 Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-434 Unrestricted Upload of File with Dangerous Type" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "name": "https://www.gegridsolutions.com/Passport/Login.aspx", "refsource": "CONFIRM", "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ] }, "solution": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27428", "datePublished": "2022-03-23T19:46:25", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T20:48:17.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27418
Vulnerability from cvelistv5
Published
2022-03-23 19:46
Modified
2024-08-03 20:48
Severity ?
EPSS score ?
Summary
GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings.
References
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02 | x_refsource_CONFIRM | |
https://www.gegridsolutions.com/Passport/Login.aspx | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:48:17.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "UR family", "vendor": "GE", "versions": [ { "lessThan": "8.1x", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "descriptions": [ { "lang": "en", "value": "GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-23T19:46:23", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ], "solutions": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "title": "GE UR family input validation", "workarounds": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27418", "STATE": "PUBLIC", "TITLE": "GE UR family input validation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "UR family", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.1x" } ] } } ] }, "vendor_name": "GE" } ] } }, "credit": [ { "lang": "eng", "value": "SCADA-X, DOE\u2019s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02", "refsource": "CONFIRM", "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02" }, { "name": "https://www.gegridsolutions.com/Passport/Login.aspx", "refsource": "CONFIRM", "url": "https://www.gegridsolutions.com/Passport/Login.aspx" } ] }, "solution": [ { "lang": "en", "value": "GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required)." } ], "source": { "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. \n\nGE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system." } ] } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27418", "datePublished": "2022-03-23T19:46:23", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T20:48:17.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }