CVE-2021-27428

Published on: Not Yet Published

Last Modified on: 04/01/2022 03:28:00 PM UTC

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Multilin B30 from Ge contain the following vulnerability:

GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool – Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10.

  • CVE-2021-27428 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as CRITICAL severity.
  • Affected Vendor/Software: URL Logo GE - UR family version < 8.1x
Vulnerability Patch/Work Around
  • GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. GE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
GE UR family | CISA www.cisa.gov
text/html
URL Logo CONFIRM www.cisa.gov/uscert/ics/advisories/icsa-21-075-02
Grid Passport Login : GE Grid Solutions www.gegridsolutions.com
text/html
URL Logo CONFIRM www.gegridsolutions.com/Passport/Login.aspx

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Hardware Device InfoGeMultilin B30-AllAllAll
Operating
System
GeMultilin B30 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin B90-AllAllAll
Operating
System
GeMultilin B90 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin C30-AllAllAll
Operating
System
GeMultilin C30 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin C60-AllAllAll
Operating
System
GeMultilin C60 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin C70-AllAllAll
Operating
System
GeMultilin C70 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin C95-AllAllAll
Operating
System
GeMultilin C95 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin D30-AllAllAll
Operating
System
GeMultilin D30 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin D60-AllAllAll
Operating
System
GeMultilin D60 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin F35-AllAllAll
Operating
System
GeMultilin F35 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin F60-AllAllAll
Operating
System
GeMultilin F60 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin G30-AllAllAll
Operating
System
GeMultilin G30 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin G60-AllAllAll
Operating
System
GeMultilin G60 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin L30-AllAllAll
Operating
System
GeMultilin L30 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin L60-AllAllAll
Operating
System
GeMultilin L60 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin L90-AllAllAll
Operating
System
GeMultilin L90 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin M60-AllAllAll
Operating
System
GeMultilin M60 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin N60-AllAllAll
Operating
System
GeMultilin N60 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin T35-AllAllAll
Operating
System
GeMultilin T35 FirmwareAllAllAllAll
Hardware Device InfoGeMultilin T60-AllAllAll
Operating
System
GeMultilin T60 FirmwareAllAllAllAll
  • cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*:

Discovery Credit

SCADA-X, DOE’s Cyber Testing for Resilient Industrial Control Systems (CyTRICS) program, Verve Industrial, and VuMetric reported these vulnerabilities to GE.

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2021-27428 : GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup confi… twitter.com/i/web/status/1… 2022-03-23 20:20:48
Twitter Icon @WesUncensored New vulnerability on the NVD: CVE-2021-27428 ift.tt/hfNexAm 2022-03-23 22:33:20
Reddit Logo Icon /r/netcve CVE-2021-27428 2022-03-23 21:39:10
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report