GE UR firmware versions prior to version 8.1x shares MODBUS memory map as part of the communications guide. GE was made aware a “Last-key pressed” MODBUS register can be used to gain unauthorized information.

Project Subscriptions

Vendors Products
Multilin B30 Subscribe
Multilin B30 Firmware Subscribe
Multilin B90 Subscribe
Multilin B90 Firmware Subscribe
Multilin C30 Subscribe
Multilin C30 Firmware Subscribe
Multilin C60 Subscribe
Multilin C60 Firmware Subscribe
Multilin C70 Subscribe
Multilin C70 Firmware Subscribe
Multilin C95 Subscribe
Multilin C95 Firmware Subscribe
Multilin D30 Subscribe
Multilin D30 Firmware Subscribe
Multilin D60 Subscribe
Multilin D60 Firmware Subscribe
Multilin F35 Subscribe
Multilin F35 Firmware Subscribe
Multilin F60 Subscribe
Multilin F60 Firmware Subscribe
Multilin G30 Subscribe
Multilin G30 Firmware Subscribe
Multilin G60 Subscribe
Multilin G60 Firmware Subscribe
Multilin L30 Subscribe
Multilin L30 Firmware Subscribe
Multilin L60 Subscribe
Multilin L60 Firmware Subscribe
Multilin L90 Subscribe
Multilin L90 Firmware Subscribe
Multilin M60 Subscribe
Multilin M60 Firmware Subscribe
Multilin N60 Subscribe
Multilin N60 Firmware Subscribe
Multilin T35 Subscribe
Multilin T35 Firmware Subscribe
Multilin T60 Subscribe
Multilin T60 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-14178 GE UR firmware versions prior to version 8.1x shares MODBUS memory map as part of the communications guide. GE was made aware a “Last-key pressed” MODBUS register can be used to gain unauthorized information.
Fixes

Solution

GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required).


Workaround

GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place. GE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system.

History

Wed, 16 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-16T16:40:47.222Z

Reserved: 2021-02-19T00:00:00.000Z

Link: CVE-2021-27424

cve-icon Vulnrichment

Updated: 2024-08-03T20:48:17.121Z

cve-icon NVD

Status : Modified

Published: 2022-03-23T20:15:08.417

Modified: 2024-11-21T05:57:57.660

Link: CVE-2021-27424

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses