Metrics
Affected Vendors & Products
No advisories yet.
Solution
GE Vernova recommends that users upgrade to the appropriate non-affected version listed above in accordance with their use case and architecture as this is the most complete method to address the Vulnerability. Also, users are strongly advised to follow the SDG instructions. The complete SDG can be found in the Smallworld Documentation. To obtain the latest version of SWMFS, please contact your local support representative at Customer Center.
Workaround
No workaround given by the vendor.
Mon, 10 Nov 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ge Vernova
Ge Vernova smallworld |
|
| Vendors & Products |
Ge Vernova
Ge Vernova smallworld |
Fri, 07 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 07 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Authentication vulnerability in GE Vernova Smallworld on Windows, Linux allows Authentication Abuse.This issue affects Smallworld: 5.3.3 and prior versions for Linux, and 5.3.4. and prior versions for Windows. | |
| Title | Smallworld SWMFS Improper Authentication | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GE_Vernova
Published:
Updated: 2025-11-13T17:16:35.591Z
Reserved: 2025-04-03T13:47:11.155Z
Link: CVE-2025-3222
Updated: 2025-11-07T19:17:09.727Z
Status : Awaiting Analysis
Published: 2025-11-07T17:15:47.500
Modified: 2025-11-12T16:20:22.257
Link: CVE-2025-3222
No data.
OpenCVE Enrichment
Updated: 2025-11-10T09:33:55Z