Search criteria
6 vulnerabilities
CVE-2026-1763 (GCVE-0-2026-1763)
Vulnerability from cvelistv5 – Published: 2026-02-10 20:06 – Updated: 2026-02-10 20:29
VLAI?
Title
Enervista UR Setup DLL Hijacking
Summary
Vulnerability in GE Vernova Enervista UR Setup on Windows.This issue affects Enervista: 8.6 and previous versions.
Severity ?
4.6 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| GE Vernova | Enervista |
Affected:
8.6 and previous versions
|
Credits
Reid Wightman
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-1763",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-10T20:29:35.281884Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T20:29:43.312Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "UR Setup",
"platforms": [
"Windows"
],
"product": "Enervista",
"vendor": "GE Vernova",
"versions": [
{
"status": "affected",
"version": "8.6 and previous versions"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Reid Wightman"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Vulnerability in GE Vernova Enervista UR Setup on Windows.\u003cp\u003eThis issue affects Enervista: 8.6 and previous versions.\u003c/p\u003e"
}
],
"value": "Vulnerability in GE Vernova Enervista UR Setup on Windows.This issue affects Enervista: 8.6 and previous versions."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T20:06:12.992Z",
"orgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"shortName": "GE_Vernova"
},
"references": [
{
"url": "https://www.gevernova.com/grid-solutions/passport/login?destination=resources%3Fprod%3Durfamily%26type%3D21%26node_id%3D4987%26check_logged_in%3D1"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The EnerVista URPC installation software versions prior to 8.70, used an incorrect method of \nloading the DLL (dynamic Link Library) file by referencing it relative to the location of the installation \nfolder. If the system in which the software is installed gets compromised, an attacker could exploit \nthis weakness and replace the legitimate DLL with a malicious file. \u003cbr\u003e\u003cbr\u003e\nThe EnerVista UR Setup software installation has been upgraded to address this vulnerability. \n\n\u003cbr\u003e"
}
],
"value": "The EnerVista URPC installation software versions prior to 8.70, used an incorrect method of \nloading the DLL (dynamic Link Library) file by referencing it relative to the location of the installation \nfolder. If the system in which the software is installed gets compromised, an attacker could exploit \nthis weakness and replace the legitimate DLL with a malicious file. \n\n\nThe EnerVista UR Setup software installation has been upgraded to address this vulnerability."
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Enervista UR Setup DLL Hijacking",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "As a workaround, GE Vernova recommends having secure infrastructure in place, which can protect the \nsystem. We also recommend that customers protect their digital devices using a defense-in-depth \nstrategy. This includes, but is not limited to, placing digital devices inside the control system network \nsecurity perimeter, access controls, robust network monitoring (such as Intrusion Detection System) and \nother mitigation techniques in place. Please refer to the product secure deployment guide. \n\n\n\u003cbr\u003e\u003cbr\u003e\n\nIt is essential for organizations to prioritize cybersecurity measures, including regular vulnerability \nassessments and prompt application of security patches. \n\n\u003cbr\u003e"
}
],
"value": "As a workaround, GE Vernova recommends having secure infrastructure in place, which can protect the \nsystem. We also recommend that customers protect their digital devices using a defense-in-depth \nstrategy. This includes, but is not limited to, placing digital devices inside the control system network \nsecurity perimeter, access controls, robust network monitoring (such as Intrusion Detection System) and \nother mitigation techniques in place. Please refer to the product secure deployment guide. \n\n\n\n\n\n\nIt is essential for organizations to prioritize cybersecurity measures, including regular vulnerability \nassessments and prompt application of security patches."
}
],
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"assignerShortName": "GE_Vernova",
"cveId": "CVE-2026-1763",
"datePublished": "2026-02-10T20:06:12.992Z",
"dateReserved": "2026-02-02T14:36:45.715Z",
"dateUpdated": "2026-02-10T20:29:43.312Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2026-1762 (GCVE-0-2026-1762)
Vulnerability from cvelistv5 – Published: 2026-02-10 20:06 – Updated: 2026-02-10 20:37
VLAI?
Title
Enervista UR Setup Directory Traversal Vulnerability
Summary
A vulnerability in GE Vernova Enervista UR Setup on Windows allows File Manipulation.This issue affects Enervista: 8.6 and prior versions.
Severity ?
CWE
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| GE Vernova | Enervista |
Affected:
8.6 and prior versions
(Linux)
|
Credits
Reid Wightman
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-1762",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-10T20:34:57.688134Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T20:37:25.289Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "UR Setup",
"platforms": [
"Windows"
],
"product": "Enervista",
"vendor": "GE Vernova",
"versions": [
{
"status": "affected",
"version": "8.6 and prior versions",
"versionType": "Linux"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Reid Wightman"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability in GE Vernova Enervista UR Setup on Windows allows File Manipulation.\u003cp\u003eThis issue affects Enervista: 8.6 and prior versions.\u003c/p\u003e"
}
],
"value": "A vulnerability in GE Vernova Enervista UR Setup on Windows allows File Manipulation.This issue affects Enervista: 8.6 and prior versions."
}
],
"impacts": [
{
"capecId": "CAPEC-165",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-165 File Manipulation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "LOW",
"baseScore": 2.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-23",
"description": "CWE-23",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-10T20:06:00.213Z",
"orgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"shortName": "GE_Vernova"
},
"references": [
{
"url": "https://www.gevernova.com/grid-solutions/resources?prod=urfamily\u0026type=21\u0026node_id=4987\u0026check_logged_in=1"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "We strongly recommend that users with impacted firmware versions update their UR devices to UR \nfirmware version 8.70, released in November 2025, to resolve these vulnerabilities. We also recommend \nupgrading the EnerVista UR Setup configuration tool to version 8.70 or greater. \u003cbr\u003e\u003cbr\u003e\nEnervista UR Setup software is backward compatible, users can upgrade it to version 8.70, \nindependently of upgrading their UR IED to FW v870.\n\n\u003cbr\u003e"
}
],
"value": "We strongly recommend that users with impacted firmware versions update their UR devices to UR \nfirmware version 8.70, released in November 2025, to resolve these vulnerabilities. We also recommend \nupgrading the EnerVista UR Setup configuration tool to version 8.70 or greater. \n\n\nEnervista UR Setup software is backward compatible, users can upgrade it to version 8.70, \nindependently of upgrading their UR IED to FW v870."
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Enervista UR Setup Directory Traversal Vulnerability",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "As a workaround, GE Vernova recommends having secure infrastructure in place, which can protect the \nsystem. We also recommend that customers protect their digital devices using a defense-in-depth \nstrategy. This includes, but is not limited to, placing digital devices inside the control system network \nsecurity perimeter, access controls, robust network monitoring (such as Intrusion Detection System) and \nother mitigation techniques in place. Please refer to the product secure deployment guide.\n\nIt is essential for organizations to prioritize cybersecurity measures, including regular vulnerability \nassessments and prompt application of security patches.\n\n \n\n\n\u003cbr\u003e"
}
],
"value": "As a workaround, GE Vernova recommends having secure infrastructure in place, which can protect the \nsystem. We also recommend that customers protect their digital devices using a defense-in-depth \nstrategy. This includes, but is not limited to, placing digital devices inside the control system network \nsecurity perimeter, access controls, robust network monitoring (such as Intrusion Detection System) and \nother mitigation techniques in place. Please refer to the product secure deployment guide.\n\nIt is essential for organizations to prioritize cybersecurity measures, including regular vulnerability \nassessments and prompt application of security patches."
}
],
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"assignerShortName": "GE_Vernova",
"cveId": "CVE-2026-1762",
"datePublished": "2026-02-10T20:06:00.213Z",
"dateReserved": "2026-02-02T14:36:44.351Z",
"dateUpdated": "2026-02-10T20:37:25.289Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-3222 (GCVE-0-2025-3222)
Vulnerability from cvelistv5 – Published: 2025-11-07 16:28 – Updated: 2025-11-13 17:16
VLAI?
Title
Smallworld SWMFS Improper Authentication
Summary
Improper Authentication vulnerability in GE Vernova Smallworld on Windows, Linux allows Authentication Abuse.This issue affects Smallworld: 5.3.3 and prior versions for Linux, and 5.3.4. and prior versions for Windows.
Severity ?
CWE
- CWE-287 - Improper Authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| GE Vernova | Smallworld |
Affected:
5.3.3
(Linux)
Affected: 5.3.4 (Windows) |
Credits
Théo GOBINET
Azaël MARTIN
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-3222",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-07T19:17:06.399847Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-07T19:17:12.529Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"Linux"
],
"product": "Smallworld",
"vendor": "GE Vernova",
"versions": [
{
"status": "affected",
"version": "5.3.3",
"versionType": "Linux"
},
{
"status": "affected",
"version": "5.3.4",
"versionType": "Windows"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Th\u00e9o GOBINET"
},
{
"lang": "en",
"type": "finder",
"value": "Aza\u00ebl MARTIN"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Authentication vulnerability in GE Vernova Smallworld on Windows, Linux allows Authentication Abuse.\u003cp\u003eThis issue affects Smallworld: 5.3.3 and prior versions for Linux, and 5.3.4. and prior versions for Windows.\u003c/p\u003e"
}
],
"value": "Improper Authentication vulnerability in GE Vernova Smallworld on Windows, Linux allows Authentication Abuse.This issue affects Smallworld: 5.3.3 and prior versions for Linux, and 5.3.4. and prior versions for Windows."
}
],
"impacts": [
{
"capecId": "CAPEC-114",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-114 Authentication Abuse"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287 Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-13T17:16:35.591Z",
"orgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"shortName": "GE_Vernova"
},
"references": [
{
"url": "https://www.gevernova.com/content/dam/cyber_security/global/en_US/pdfs/SecurityAdvisory_ImproperAuthentication_SWMFS.pdf"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "GE Vernova recommends that users upgrade to the appropriate non-affected version listed above in accordance with their use case and architecture as this is the most complete method to address the Vulnerability.\u003cbr\u003e\u003cbr\u003eAlso, users are strongly advised to follow the SDG instructions. The complete SDG can be found in the Smallworld Documentation.\u003cbr\u003e\u003cbr\u003eTo obtain the latest version of SWMFS, please contact your local support representative at Customer Center.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "GE Vernova recommends that users upgrade to the appropriate non-affected version listed above in accordance with their use case and architecture as this is the most complete method to address the Vulnerability.\n\nAlso, users are strongly advised to follow the SDG instructions. The complete SDG can be found in the Smallworld Documentation.\n\nTo obtain the latest version of SWMFS, please contact your local support representative at Customer Center."
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Smallworld SWMFS Improper Authentication",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"assignerShortName": "GE_Vernova",
"cveId": "CVE-2025-3222",
"datePublished": "2025-11-07T16:28:45.217Z",
"dateReserved": "2025-04-03T13:47:11.155Z",
"dateUpdated": "2025-11-13T17:16:35.591Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-7719 (GCVE-0-2025-7719)
Vulnerability from cvelistv5 – Published: 2025-11-07 16:28 – Updated: 2025-11-13 17:17
VLAI?
Title
Smallworld SWMFS Arbitrary File Ops
Summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in GE Vernova Smallworld on Windows, Linux allows File Manipulation.This issue affects Smallworld: 5.3.5. and previous versions.
Severity ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| GE Vernova | Smallworld |
Affected:
5.3.5
|
Credits
Théo GOBINET
Azaël MARTIN
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-7719",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-07T19:17:36.891267Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-07T19:17:44.314Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"Linux"
],
"product": "Smallworld",
"vendor": "GE Vernova",
"versions": [
{
"status": "affected",
"version": "5.3.5"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Th\u00e9o GOBINET"
},
{
"lang": "en",
"type": "finder",
"value": "Aza\u00ebl MARTIN"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in GE Vernova Smallworld on Windows, Linux allows File Manipulation.\u003cp\u003eThis issue affects Smallworld: 5.3.5. and previous versions.\u003c/p\u003e"
}
],
"value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in GE Vernova Smallworld on Windows, Linux allows File Manipulation.This issue affects Smallworld: 5.3.5. and previous versions."
}
],
"impacts": [
{
"capecId": "CAPEC-165",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-165 File Manipulation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-13T17:17:12.293Z",
"orgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"shortName": "GE_Vernova"
},
"references": [
{
"url": "https://www.gevernova.com/content/dam/cyber_security/global/en_US/pdfs/SecurityAdvisory_ArbitraryFileOps_SWMFS.pdf"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "GE Vernova recommends that users upgrade to the appropriate non-affected version listed above in accordance with their use case and architecture, as this is the most complete method to address the Vulnerability.\u003cbr\u003e\u003cbr\u003eAlso, users are strongly advised to follow the SDG instructions. The complete SDG can be found in the Smallworld Documentation.\u003cbr\u003e\u003cbr\u003eTo obtain the latest version of SWMFS, please contact your local support representative at Customer Center.\u003cbr\u003e"
}
],
"value": "GE Vernova recommends that users upgrade to the appropriate non-affected version listed above in accordance with their use case and architecture, as this is the most complete method to address the Vulnerability.\n\nAlso, users are strongly advised to follow the SDG instructions. The complete SDG can be found in the Smallworld Documentation.\n\nTo obtain the latest version of SWMFS, please contact your local support representative at Customer Center."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Smallworld SWMFS Arbitrary File Ops",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"assignerShortName": "GE_Vernova",
"cveId": "CVE-2025-7719",
"datePublished": "2025-11-07T16:28:03.432Z",
"dateReserved": "2025-07-16T16:37:57.358Z",
"dateUpdated": "2025-11-13T17:17:12.293Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-9038 (GCVE-0-2025-9038)
Vulnerability from cvelistv5 – Published: 2025-09-22 14:49 – Updated: 2025-09-24 13:31
VLAI?
Title
S1 Agile Privilege Escalation
Summary
Improper Privilege Management vulnerability in GE Vernova S1 Agile Configuration Software on Windows allows Privilege Escalation.This issue affects S1 Agile Configuration Software: 3.1 and previous version.
Severity ?
CWE
- CWE-269 - Improper Privilege Management
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| GE Vernova | S1 Agile Configuration Software |
Affected:
3.1 and previous version
|
Credits
Charit Misra from DNV, Netherlands
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-9038",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-22T16:54:16.367027Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-22T17:26:59.035Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "S1 Agile Configuration Software",
"vendor": "GE Vernova",
"versions": [
{
"status": "affected",
"version": "3.1 and previous version"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Charit Misra from DNV, Netherlands"
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper Privilege Management vulnerability in GE Vernova S1 Agile Configuration Software on Windows allows Privilege Escalation.This issue affects S1 Agile Configuration Software: 3.1 and previous version."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NEGLIGIBLE",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-24T13:31:23.806Z",
"orgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"shortName": "GE_Vernova"
},
"references": [
{
"url": "https://www.gevernova.com/grid-solutions/sites/default/files/resources/products/support/ges-2025-001.pdf"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "To resolve this issue and enhance security, during the S1 Agile application installation, we ensure \nonly privileged users can access various folders used by the S1 Agile application. This ensures \nthat S1 Agile files can not be edited or replaced by users without sufficient privileges on that \ncomputer. \u003cbr\u003e\u003cbr\u003e\nWe would like to assert that this attack, if successful, can give \u201cAdministrator\u201d privileges to the \nattacker on the computer, but the configured IEDs will not see any impact in their configuration or \nfunctionality. The RBAC (\u2018Role-Based Access Control\u2019) on the IED remains unimpacted. \n\n\u003cbr\u003e\u003cbr\u003e\n\nWe strongly recommend customers to upgrade to the latest software version available. \nSoftware version 3.1.1 is released for customer usage in January 2025. \n\n\u003cbr\u003e"
}
],
"value": "To resolve this issue and enhance security, during the S1 Agile application installation, we ensure \nonly privileged users can access various folders used by the S1 Agile application. This ensures \nthat S1 Agile files can not be edited or replaced by users without sufficient privileges on that \ncomputer. \n\n\nWe would like to assert that this attack, if successful, can give \u201cAdministrator\u201d privileges to the \nattacker on the computer, but the configured IEDs will not see any impact in their configuration or \nfunctionality. The RBAC (\u2018Role-Based Access Control\u2019) on the IED remains unimpacted. \n\n\n\n\n\nWe strongly recommend customers to upgrade to the latest software version available. \nSoftware version 3.1.1 is released for customer usage in January 2025."
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "S1 Agile Privilege Escalation",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "As a workaround, GE Vernova recommends having sufficient security controls in place on the \nworkstation where S1 Agile software is installed. This will ensure the attacker\u2019s remote \nconnection to the computer is not feasible. Harden the computer on which S1 Agile is installed. \nThe product deployment guide can be used to understand the guidelines around how the product \ncan be deployed in the end user\u2019s environment. \n\n\u003cbr\u003e"
}
],
"value": "As a workaround, GE Vernova recommends having sufficient security controls in place on the \nworkstation where S1 Agile software is installed. This will ensure the attacker\u2019s remote \nconnection to the computer is not feasible. Harden the computer on which S1 Agile is installed. \nThe product deployment guide can be used to understand the guidelines around how the product \ncan be deployed in the end user\u2019s environment."
}
],
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"assignerShortName": "GE_Vernova",
"cveId": "CVE-2025-9038",
"datePublished": "2025-09-22T14:49:38.805Z",
"dateReserved": "2025-08-14T13:30:30.722Z",
"dateUpdated": "2025-09-24T13:31:23.806Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-3223 (GCVE-0-2025-3223)
Vulnerability from cvelistv5 – Published: 2025-05-19 21:03 – Updated: 2025-05-20 13:00
VLAI?
Title
WorkstationST EGD Configuration Server Path Traversal Vulnerability
Summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in GE Vernova WorkstationST on Windows (EGD Configuration Server modules) allows Path Traversal.This issue affects WorkstationST: WorkstationST V07.10.10C and earlier.
Severity ?
5.9 (Medium)
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| GE Vernova | WorkstationST |
Affected:
WorkstationST V07.10.10C and earlier
(Custom)
|
Credits
Ricardo Pelaz García
Roberto Garcia Hervás
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-3223",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-20T12:59:54.621643Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-20T13:00:02.792Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"EGD Configuration Server"
],
"platforms": [
"Windows"
],
"product": "WorkstationST",
"vendor": "GE Vernova",
"versions": [
{
"status": "affected",
"version": "WorkstationST V07.10.10C and earlier",
"versionType": "Custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ricardo Pelaz Garc\u00eda"
},
{
"lang": "en",
"type": "finder",
"value": "Roberto Garcia Herv\u00e1s"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in GE Vernova WorkstationST on Windows (EGD Configuration Server modules) allows Path Traversal.\u003cp\u003eThis issue affects WorkstationST: WorkstationST V07.10.10C and earlier.\u003c/p\u003e"
}
],
"value": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability in GE Vernova WorkstationST on Windows (EGD Configuration Server modules) allows Path Traversal.This issue affects WorkstationST: WorkstationST V07.10.10C and earlier."
}
],
"impacts": [
{
"capecId": "CAPEC-126",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-126 Path Traversal"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-05-19T21:03:32.078Z",
"orgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"shortName": "GE_Vernova"
},
"references": [
{
"url": "https://www.gevernova.com/content/dam/cyber_security/global/en_US/pdfs/2024-09-24_EGD_Config_Server_File_Overwrite.pdf"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "WorkstationST EGD Configuration Server Path Traversal Vulnerability",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
"assignerShortName": "GE_Vernova",
"cveId": "CVE-2025-3223",
"datePublished": "2025-05-19T21:03:32.078Z",
"dateReserved": "2025-04-03T13:57:26.486Z",
"dateUpdated": "2025-05-20T13:00:02.792Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}