GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings.

Project Subscriptions

Vendors Products
Multilin B30 Subscribe
Multilin B30 Firmware Subscribe
Multilin B90 Subscribe
Multilin B90 Firmware Subscribe
Multilin C30 Subscribe
Multilin C30 Firmware Subscribe
Multilin C60 Subscribe
Multilin C60 Firmware Subscribe
Multilin C70 Subscribe
Multilin C70 Firmware Subscribe
Multilin C95 Subscribe
Multilin C95 Firmware Subscribe
Multilin D30 Subscribe
Multilin D30 Firmware Subscribe
Multilin D60 Subscribe
Multilin D60 Firmware Subscribe
Multilin F35 Subscribe
Multilin F35 Firmware Subscribe
Multilin F60 Subscribe
Multilin F60 Firmware Subscribe
Multilin G30 Subscribe
Multilin G30 Firmware Subscribe
Multilin G60 Subscribe
Multilin G60 Firmware Subscribe
Multilin L30 Subscribe
Multilin L30 Firmware Subscribe
Multilin L60 Subscribe
Multilin L60 Firmware Subscribe
Multilin L90 Subscribe
Multilin L90 Firmware Subscribe
Multilin M60 Subscribe
Multilin M60 Firmware Subscribe
Multilin N60 Subscribe
Multilin N60 Firmware Subscribe
Multilin T35 Subscribe
Multilin T35 Firmware Subscribe
Multilin T60 Subscribe
Multilin T60 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-14172 GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings.
Fixes

Solution

GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required).


Workaround

GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. GE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:41:07.211Z

Reserved: 2021-02-19T00:00:00.000Z

Link: CVE-2021-27418

cve-icon Vulnrichment

Updated: 2024-08-03T20:48:17.146Z

cve-icon NVD

Status : Modified

Published: 2022-03-23T20:15:08.247

Modified: 2024-11-21T05:57:56.947

Link: CVE-2021-27418

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses