GE General Electric
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any GE product.
RSS Feeds for GE security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in GE products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by GE Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in GE. GE did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 19 | 8.58 |
| 2022 | 11 | 7.55 |
| 2021 | 2 | 0.00 |
| 2020 | 6 | 0.00 |
| 2019 | 5 | 7.76 |
| 2018 | 6 | 4.80 |
It may take a day or so for new GE vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent GE Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2023-5908 | Nov 30, 2023 |
KEPServerEX Buffer Overflow Enables Crash / Info LeakKEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information. |
|
| CVE-2023-5909 | Nov 30, 2023 |
KEPServerEX Unvalidated Client Certs Enable Unauth ConnectionsKEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect. |
|
| CVE-2023-0898 | Nov 07, 2023 |
GE MiCOM S1 Agile DLL Exec via Dir InjectionGeneral Electric MiCOM S1 Agile is vulnerable to an attacker achieving code execution by placing malicious DLL files in the directory of the application. |
|
| CVE-2023-4487 | Sep 05, 2023 |
GE CIMPLICITY 2023 Local PrivEsc via Config File InjectionGE CIMPLICITY 2023 is by a process control vulnerability, which could allow a local attacker to insert malicious configuration files in the expected web server execution path to escalate privileges and gain full control of the HMI software. |
|
| CVE-2023-3463 | Jul 19, 2023 |
GE Digital CIMPLICITY memory corruption via unvalidated inputAll versions of GE Digital CIMPLICITY that are not adhering to SDG guidance and accepting documents from untrusted sources are vulnerable to memory corruption issues due to insufficient input validation, including issues such as out-of-bounds reads and writes, use-after-free, stack-based buffer overflows, uninitialized pointers, and a heap-based buffer overflow. Successful exploitation could allow an attacker to execute arbitrary code. |
|
| CVE-2023-1552 | Apr 11, 2023 |
GE ToolboxST <7.10 Deserialization RCE VulnerabilityToolboxST prior to version 7.10 is affected by a deserialization vulnerability. An attacker with local access to an HMI or who has conducted a social engineering attack on an authorized operator could execute code in a Toolbox user's context through the deserialization of an untrusted configuration file. Two CVSS scores have been provided to capture the differences between the two aforementioned attack vectors. Customers are advised to update to ToolboxST 7.10 which can be found in ControlST 7.10. If unable to update at this time customers should ensure they are following the guidance laid out in GE Gas Power's Secure Deployment Guide (GEH-6839). Customers should ensure they are not running ToolboxST as an Administrative user. |
|
| CVE-2022-2825 | Mar 29, 2023 |
Remote Code Exec via Stack Buffer Overflow in Kepware KEPServerEX 6.11This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-18411. |
|
| CVE-2022-2848 | Mar 29, 2023 |
RCE in Kepware KEPServerEX 6.11.718.0 via Encoding Buffer OverflowThis vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16486. |
|
| CVE-2023-0598 | Mar 16, 2023 |
GE Digital Proficy iFIX v6.1/6.5/2022 Code Injection Allows Full ControlGE Digital Proficy iFIX 2022, GE Digital Proficy iFIX v6.1, and GE Digital Proficy iFIX v6.5 are vulnerable to code injection, which may allow an attacker to insert malicious configuration files in the expected web server execution path and gain full control of the HMI software. |
|
| CVE-2023-0755 | Feb 23, 2023 |
Improper Array Index Validation Enables Remote Code ExecutionThe affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code. |
|
| CVE-2023-0754 | Feb 23, 2023 |
Integer Overflow in Unknown Server RCE & Crash (CVE-2023-0754)The affected products are vulnerable to an integer overflow or wraparound, which could allow an attacker to crash the server and remotely execute arbitrary code. |
|
| CVE-2022-38469 | Jan 18, 2023 |
Cisco Secure Endpoint: Key Exposure Lets Decrypt Sensitive DataAn unauthorized user with network access and the decryption key could decrypt sensitive data, such as usernames and passwords. |
|
| CVE-2022-43494 | Jan 18, 2023 |
Unprivileged File Read via Path Traversal (CVE-2022-43494)An unauthorized user could be able to read any file on the system, potentially exposing sensitive information. |
|
| CVE-2022-46331 | Jan 18, 2023 |
Linux Kernel: Privileged File Delete via Unchecked Path (CVE-2022-46331)An unauthorized user could possibly delete any file on the system. |
|
| CVE-2022-46660 | Jan 18, 2023 |
CVE-2022-46660: Full Path Control File Write (Unknown)An unauthorized user could alter or write files with full control over the path and content of the file. |
|
| CVE-2022-46732 | Jan 18, 2023 |
Windows Local Service Auth Bypass Allows Command ExecutionEven if the authentication fails for local service authentication, the requested command could still execute regardless of authentication status. |
|
| CVE-2022-43975 | Jan 17, 2023 |
FC46-WebBridge <=3.7.6.25p0 Directory Traversal via TCP Port 8888An issue was discovered in FC46-WebBridge on GE Grid Solutions MS3000 devices before 3.7.6.25p0_3.2.2.17p0_4.7p0. A vulnerability in the web server allows arbitrary files and configurations to be read via directory traversal over TCP port 8888. |
|
| CVE-2022-43976 | Jan 17, 2023 |
GE Grid MS3000 FC46-WebBridge API No-Auth on TCP 8888 (pre3.7.6.25p0)An issue was discovered in FC46-WebBridge on GE Grid Solutions MS3000 devices before 3.7.6.25p0_3.2.2.17p0_4.7p0. Direct access to the API is possible on TCP port 8888 via programs located in the cgi-bin folder without any authentication. |
|
| CVE-2022-43977 | Jan 17, 2023 |
GE Grid MS3000 debug TCP port no ACL ( v3.7.6, 3.2.2.17, 4.7)An issue was discovered on GE Grid Solutions MS3000 devices before 3.7.6.25p0_3.2.2.17p0_4.7p0. The debug port accessible via TCP (a qconn service) lacks access control. |
|
| CVE-2022-3092 | Dec 08, 2022 |
GE CIMPICITY OOB Write Enables Remote Code ExecutionGE CIMPICITY versions 2022 and prior is vulnerable to an out-of-bounds write, which could allow an attacker to execute arbitrary code. |
|
| CVE-2022-3084 | Dec 08, 2022 |
GE CIMPICITY Arbitrary Code Exec via gmmiObj CGmmiRootOptionTableGE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary code. |
|
| CVE-2022-2952 | Dec 07, 2022 |
GE CIMPICITY Arbitrary Code Exec via Faulting Address FlawGE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code. |
|
| CVE-2022-2948 | Dec 07, 2022 |
GE Cimplicity heap buffer overflow CVE-2022-2948GE CIMPICITY versions 2022 and prior is vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code. |
|
| CVE-2022-2002 | Dec 07, 2022 |
GE CIMPICITY Code Flow Hijack via gmmiObj Pointer Arbitrary Code ExecGE CIMPICITY versions 2022 and prior is vulnerable when data from faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code. |
|
| CVE-2022-37953 | Aug 25, 2022 |
HTTP Response Splitting in WorkstationST < v07.09.15An HTTP response splitting vulnerability exists in the AM Gateway Challenge-Response dialog of WorkstationST (<v07.09.15) and could allow an attacker to compromise a victim's browser/session. WorkstationST is only deployed in specific, controlled environments rendering attack complexity significantly higher than if the attack were conducted on the software in isolation. WorkstationST v07.09.15 can be found in ControlST v07.09.07 SP8 and greater. |
|
| CVE-2022-37952 | Aug 25, 2022 |
XSS in WorkstationST iHistorian DD (before 07.09.15)A reflected cross-site scripting (XSS) vulnerability exists in the iHistorian Data Display of WorkstationST (<v07.09.15) could allow an attacker to compromise a victim's browser. WorkstationST is only deployed in specific, controlled environments rendering attack complexity significantly higher than if the attack were conducted on the software in isolation. WorkstationST v07.09.15 can be found in ControlST v07.09.07 SP8 and greater. |
|
| CVE-2021-44477 | Mar 25, 2022 |
GE Gas Power ToolBoxST Version v04.07.05C suffers from an XML external entity (XXE) vulnerability using the DTD parameter entities techniqueGE Gas Power ToolBoxST Version v04.07.05C suffers from an XML external entity (XXE) vulnerability using the DTD parameter entities technique that could result in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the XML project/template file. |
|
| CVE-2021-27430 | Mar 23, 2022 |
GE UR bootloader binary Version 7.00, 7.01 and 7.02 included unused hardcoded credentialsGE UR bootloader binary Version 7.00, 7.01 and 7.02 included unused hardcoded credentials. Additionally, a user with physical access to the UR IED can interrupt the boot sequence by rebooting the UR. |
|
| CVE-2022-23921 | Feb 25, 2022 |
Exploitation of this vulnerability may result in local privilege escalation and code executionExploitation of this vulnerability may result in local privilege escalation and code execution. GE maintains exploitation of this vulnerability is only possible if the attacker has login access to a machine actively running CIMPLICITY, the CIMPLICITY server is not already running a project, and the server is licensed for multiple projects. |
|
| CVE-2022-21798 | Feb 25, 2022 |
The affected product is vulnerable due to cleartext transmission of credentials seen in the CIMPLICITY networkThe affected product is vulnerable due to cleartext transmission of credentials seen in the CIMPLICITY network, which can be easily spoofed and used to log in to make operational changes to the system. |
|
| CVE-2019-18243 | Feb 18, 2021 |
HMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through the registryHMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through the registry. This may allow privilege escalation. |
|
| CVE-2019-18255 | Feb 18, 2021 |
HMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through section objectsHMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through section objects. This may allow privilege escalation. |
|
| CVE-2020-16240 | Sep 23, 2020 |
GE Digital APM Classic, Versions 4.4 and priorGE Digital APM Classic, Versions 4.4 and prior. An insecure direct object reference (IDOR) vulnerability allows user account data to be downloaded in JavaScript object notation (JSON) format by users who should not have access to such functionality. An attacker can download sensitive data related to user accounts without having the proper privileges. |
|
| CVE-2020-16244 | Sep 23, 2020 |
GE Digital APM Classic, Versions 4.4 and priorGE Digital APM Classic, Versions 4.4 and prior. Salt is not used for hash calculation of passwords, making it possible to decrypt passwords. This design flaw, along with the IDOR vulnerability, puts the entire platform at high risk because an authenticated user can retrieve all user account data and then retrieve the actual passwords. |
|
| CVE-2020-6992 | Apr 15, 2020 |
A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and priorA local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and prior. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session. GE Digital CIMPLICITY v11.0, released January 2020, contains mitigation for this local privilege escalation vulnerability. GE Digital recommends all users upgrade to GE CIMPLICITY v11.0 or newer. |
|
| CVE-2019-13554 | Apr 07, 2020 |
GE Mark VIe Controller has an unsecured Telnet protocolGE Mark VIe Controller has an unsecured Telnet protocol that may allow a user to create an authenticated session using generic default credentials. GE recommends that users disable the Telnet service. |
|
| CVE-2019-13559 | Apr 07, 2020 |
GE Mark VIe Controller is shipped with pre-configured hard-coded credentials that may allow root-user access to the controllerGE Mark VIe Controller is shipped with pre-configured hard-coded credentials that may allow root-user access to the controller. A limited application of the affected product may ship without setup and configuration instructions immediately available to the end user. The bulk of controllers go into applications requiring the GE commissioning engineer to change default configurations during the installation process. GE recommends that users reset controller passwords during installation in the operating environment. |
|
| CVE-2020-6977 | Feb 20, 2020 |
A restricted desktop environment escape vulnerability exists in the Kiosk Mode functionality of affected devicesA restricted desktop environment escape vulnerability exists in the Kiosk Mode functionality of affected devices. Specially crafted inputs can allow the user to escape the restricted environment, resulting in access to the underlying operating system. Affected devices include the following GE Ultrasound Products: Vivid products - all versions; LOGIQ - all versions not including LOGIQ 100 Pro; Voluson - all versions; Versana Essential - all versions; Invenia ABUS Scan station - all versions; Venue - all versions not including Venue 40 R1-3 and Venue 50 R4-5 |
|
| CVE-2019-6564 | May 09, 2019 |
GE Communicator, all versions prior to 4.0.517GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to place malicious files within the installer file directory, which may allow an attacker to gain administrative privileges on a system during installation or upgrade. |
|
| CVE-2019-6544 | May 09, 2019 |
GE Communicator, all versions prior to 4.0.517, has a service running with system privilegesGE Communicator, all versions prior to 4.0.517, has a service running with system privileges that may allow an unprivileged user to perform certain administrative actions, which may allow the execution of scheduled scripts with system administrator privileges. This service is inaccessible to attackers if Windows default firewall settings are used by the end user. |
|
| CVE-2019-6546 | May 09, 2019 |
GE Communicator, all versions prior to 4.0.517GE Communicator, all versions prior to 4.0.517, allows an attacker to place malicious files within the working directory of the program, which may allow an attacker to manipulate widgets and UI elements. |
|
| CVE-2019-6548 | May 09, 2019 |
GE Communicator, all versions prior to 4.0.517, contains two backdoor accounts with hardcoded credentials, which mayGE Communicator, all versions prior to 4.0.517, contains two backdoor accounts with hardcoded credentials, which may allow control over the database. This service is inaccessible to attackers if Windows default firewall settings are used by the end user. |
|
| CVE-2019-6566 | May 09, 2019 |
GE Communicator, all versions prior to 4.0.517GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to replace the uninstaller with a malicious version, which could allow an attacker to gain administrator privileges to the system. |
|
| CVE-2018-15362 | Dec 07, 2018 |
XXE in GE Proficy Cimplicity GDS versions 9.0 R2XXE in GE Proficy Cimplicity GDS versions 9.0 R2, 9.5, 10.0 |
|
| CVE-2018-17925 | Oct 10, 2018 |
Multiple instances of this vulnerability (Unsafe ActiveX Control Marked Safe For Scripting) have been identified in the third-party ActiveX object provided to GE iFIX versions 2.0 - 5.8 by GigasoftMultiple instances of this vulnerability (Unsafe ActiveX Control Marked Safe For Scripting) have been identified in the third-party ActiveX object provided to GE iFIX versions 2.0 - 5.8 by Gigasoft. Only the independent use of the Gigasoft charting package outside the iFIX product may expose users to the reported vulnerability. The reported method shown to impact Internet Explorer is not exposed in the iFIX product, nor is the core functionality of the iFIX product known to be impacted. |
|
| CVE-2017-7908 | Oct 02, 2018 |
A heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and priorA heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and prior. A malicious HTML file that loads the ActiveX controls can trigger the vulnerability via unchecked function calls. |
|
| CVE-2018-10613 | Jun 04, 2018 |
Multiple variants of XML External Entity (XXE) attacks may be used to exfiltrate dataMultiple variants of XML External Entity (XXE) attacks may be used to exfiltrate data from the host Windows platform in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior. |
|
| CVE-2018-10611 | Jun 04, 2018 |
Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited toJava remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to allow unauthenticated users to launch applications and support remote code execution through web services. |
|
| CVE-2018-10615 | Jun 04, 2018 |
Directory traversal may lead to files being exfiltrated or deleted on the GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior host platform.Directory traversal may lead to files being exfiltrated or deleted on the GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior host platform. |
|
| CVE-2015-3976 | Aug 28, 2017 |
Cross-site scripting (XSS) vulnerability in GE Multilink ML810/3000/3100 series switch 5.2.0 and earlierCross-site scripting (XSS) vulnerability in GE Multilink ML810/3000/3100 series switch 5.2.0 and earlier, and GE Multilink ML800/1200/1600/2400 4.2.1 and earlier. |