General Electric's MDS PulseNET < 3.1.5 Multiple Vulnerabilities

Critical Nessus Network Monitor Plugin ID 9052


The remote host is running an outdated version of General Electric's MDS PulseNET application.


The version of General Electric's MDS PulseNET application is prior to 3.1.5 and is affected by multiple vulnerabilities :

- The application installs with default, hardcoded credentials for a support account. This allows remote attackers to trivially gain privileged access to the application. (OSVDB 127531)
- A flaw exists that allows traversing outside of a restricted path. The issue is due to the 'FileDownloadServlet' not properly sanitizing user input, specifically path traversal style attacks (e.g. '../') supplied via filenames. With a specially crafted request, a remote attacker can read or delete arbitrary files. (OSVDB 127532)


Upgrade to MDS PulseNET version 3.1.5 or later.

See Also

Plugin Details

Severity: Critical

ID: 9052

File Name: 9052.prm

Family: SCADA

Published: 2016/01/15

Modified: 2017/01/31

Dependencies: 9051

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 9.8

Temporal Score: 8.5


Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ge:mds_pulsenet

Patch Publication Date: 2015/09/15

Vulnerability Publication Date: 2015/09/15

Reference Information

CVE: CVE-2015-6456

OSVDB: 127531, 127532