Impact
The vulnerability in GE Vernova Enervista UR Setup on Windows permits an attacker to manipulate files by exploiting an unchecked path traversal input (CWE-23). This flaw could allow the modification of existing files, the creation of new files, or the deletion of critical configuration data, thereby potentially altering device behavior or gaining unauthorized access to sensitive configuration information. The description does not indicate that an attacker can execute code directly, so the flaw is limited to file manipulation rather than remote code execution.
Affected Systems
Enervista UR Setup software for GE Vernova, versions 8.6 and earlier, runs on Windows platforms. Firmware versions for the associated UR devices older than 8.70 are also affected; upgrading the firmware to 8.70 or later resolves the issue. The newer Enervista UR Setup configuration tool version 8.70, even when installed independently of the firmware, also mitigates the weakness.
Risk and Exploitability
The CVSS score of 2.9 classifies the vulnerability as low severity, and the EPSS score of less than 1% indicates a very small probability of exploitation in the wild. It is not listed in the CISA KEV catalog. The attack vector is not explicitly stated in the available information; however, given that the flaw exists within a Windows-based setup utility, it likely requires either local access to the host or remote access to the UR Setup service, potentially under privileged user credentials. Because the vendor recommends defensive controls such as perimeter isolation, access controls, and intrusion detection, the risk can be further reduced by normal network security measures.
OpenCVE Enrichment