GE Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware 4.2.1 and earlier and Multilink ML810, ML3000, and ML3100 switches with firmware 5.2.0 and earlier use the same RSA private key across different customers' installations, which makes it easier for remote attackers to obtain the cleartext content of network traffic by reading this key from a firmware image and then sniffing the network.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-5307 GE Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware 4.2.1 and earlier and Multilink ML810, ML3000, and ML3100 switches with firmware 5.2.0 and earlier use the same RSA private key across different customers' installations, which makes it easier for remote attackers to obtain the cleartext content of network traffic by reading this key from a firmware image and then sniffing the network.
Fixes

Solution

GE recommends users update switch firmware to the latest published version to resolve these vulnerabilities. The new firmware will enable new keys to be calculated and exchanged, resolve the slow data transfer and potential denial of service, and prevent the identified cross-site scripting vulnerabilities. The latest firmware is Version 5.3.2 for the ML800, ML1200, ML1600 and ML2400 and Version 5.3.2-3K for the ML810, ML3000, and ML3100. This firmware is available through the “Resources/Software” link in the product web sites at http://www.gedigitalenergy.com . This firmware is also available through the EnerVista Launchpad device management tool. GE recommends updating the switch over a serial connection to prevent an attacker from capturing the new key. Please refer to the GE advisory for specific information on how to install the firmware and change RSA key. The GE advisory is available at: https://www.gedigitalenergy.com/products/support/multilink/MLSB0415.pdf


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 23:45:00 +0000

Type Values Removed Values Added
Title GE Multilink Use of Hard-coded Cryptographic Key
Weaknesses CWE-321
References
Metrics cvssV2_0

{'score': 5.0, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N'}

cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-11-04T23:32:07.026Z

Reserved: 2014-08-22T00:00:00

Link: CVE-2014-5419

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-01-17T02:59:02.600

Modified: 2025-11-05T00:15:34.213

Link: CVE-2014-5419

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.