First published: Wed Mar 23 2022(Updated: )
GE UR bootloader binary Version 7.00, 7.01 and 7.02 included unused hardcoded credentials. Additionally, a user with physical access to the UR IED can interrupt the boot sequence by rebooting the UR.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
GE UR bootloader binary | =7.00 | |
GE UR bootloader binary | =7.01 | |
GE UR bootloader binary | =7.02 | |
GE Weakness in UR bootloader binary: all bootloader versions prior to 7.03/7.04 |
GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-27430.
The severity of CVE-2021-27430 is high.
GE UR bootloader binary versions 7.00, 7.01, and 7.02 are affected byCVE-2021-27430.
Yes, physical access to the UR IED is required to exploit CVE-2021-27430.
Yes, you can find references for CVE-2021-27430 at the following links: [Reference 1](https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02) and [Reference 2](https://www.gegridsolutions.com/Passport/Login.aspx).