GE UR family Unrestricted Upload of File with Dangerous Type (CVE-2021-27428)

critical Tenable OT Security Plugin ID 503347

Synopsis

The remote OT asset is affected by a vulnerability.

Description

GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

GE strongly recommends users with impacted firmware versions update their UR devices to UR firmware Version 8.10, or greater to resolve these vulnerabilities. GE provides additional mitigations and information about these vulnerabilities in GE Publication Number: GES-2021-004 (login required).

GE recommends protecting UR IED by using network defense-in-depth practices. This includes, but is not limited to, placing UR IED inside the control system network security perimeter, and having access controls, monitoring (such as an Intrusion Detection System), and other mitigating technologies in place.

GE recommends users refer to the UR Deployment guide for secure configuration of UR IED and system.

See Also

https://www.cisa.gov/uscert/ics/advisories/icsa-21-075-02

https://www.gegridsolutions.com/Passport/Login.aspx

Plugin Details

Severity: Critical

ID: 503347

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 9/29/2025

Updated: 10/1/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2021-27428

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:ge:multilin_l60_firmware, cpe:/o:ge:multilin_c30_firmware, cpe:/o:ge:multilin_l90_firmware, cpe:/o:ge:multilin_c70_firmware, cpe:/o:ge:multilin_l30_firmware, cpe:/o:ge:multilin_b90_firmware, cpe:/o:ge:multilin_f35_firmware, cpe:/o:ge:multilin_t35_firmware, cpe:/o:ge:multilin_t60_firmware, cpe:/o:ge:multilin_c95_firmware, cpe:/o:ge:multilin_c60_firmware, cpe:/o:ge:multilin_d60_firmware, cpe:/o:ge:multilin_g60_firmware, cpe:/o:ge:multilin_b30_firmware, cpe:/o:ge:multilin_m60_firmware, cpe:/o:ge:multilin_n60_firmware, cpe:/o:ge:multilin_g30_firmware, cpe:/o:ge:multilin_d30_firmware, cpe:/o:ge:multilin_f60_firmware

Required KB Items: Tenable.ot/GE

Exploit Ease: No known exploits are available

Patch Publication Date: 3/23/2022

Vulnerability Publication Date: 3/23/2022

Reference Information

CVE: CVE-2021-27428

CWE: 434

ICSA: 21-075-02