GE UR family Insecure Default Variable Initialization (CVE-2021-27426)

critical Tenable OT Security Plugin ID 503346

Synopsis

The remote OT asset is affected by a vulnerability.

Description

GE UR IED firmware versions prior to version 8.1x with Basic security variant does not allow the disabling of the Factory Mode, which is used for servicing the IED by a Factory user.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required).

GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place.

GE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system.

See Also

https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02

https://www.gegridsolutions.com/Passport/Login.aspx

Plugin Details

Severity: Critical

ID: 503346

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 9/29/2025

Updated: 10/1/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-27426

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:ge:multilin_f35_firmware, cpe:/o:ge:multilin_t35_firmware, cpe:/o:ge:multilin_m60_firmware, cpe:/o:ge:multilin_l30_firmware, cpe:/o:ge:multilin_f60_firmware, cpe:/o:ge:multilin_c60_firmware, cpe:/o:ge:multilin_g60_firmware, cpe:/o:ge:multilin_b30_firmware, cpe:/o:ge:multilin_l60_firmware, cpe:/o:ge:multilin_c30_firmware, cpe:/o:ge:multilin_c70_firmware, cpe:/o:ge:multilin_c95_firmware, cpe:/o:ge:multilin_l90_firmware, cpe:/o:ge:multilin_d60_firmware, cpe:/o:ge:multilin_t60_firmware, cpe:/o:ge:multilin_g30_firmware, cpe:/o:ge:multilin_b90_firmware, cpe:/o:ge:multilin_n60_firmware, cpe:/o:ge:multilin_d30_firmware

Required KB Items: Tenable.ot/GE

Exploit Ease: No known exploits are available

Patch Publication Date: 3/23/2022

Vulnerability Publication Date: 3/23/2022

Reference Information

CVE: CVE-2021-27426

CWE: 453

ICSA: 21-075-02