GE GE General Electric

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any GE product.

RSS Feeds for GE security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in GE products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by GE Sorted by Most Security Vulnerabilities since 2018

GE Cimplicity13 vulnerabilities

Ge Communicator6 vulnerabilities

GE Proficy Historian5 vulnerabilities

GE Ifix5 vulnerabilities

GE Industrial Gateway Server4 vulnerabilities

GE Mds Pulsenet3 vulnerabilities

GE Ms 3000 Firmware3 vulnerabilities

GE Toolboxst2 vulnerabilities

GE Workstationst2 vulnerabilities

GE Micom S1 Agile1 vulnerability

GE Historian1 vulnerability

GE Proficy Cimplicitiy1 vulnerability

GE Ur Bootloader Binary1 vulnerability

By the Year

In 2026 there have been 0 vulnerabilities in GE. GE did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 19 8.58
2022 11 7.55
2021 2 0.00
2020 6 0.00
2019 5 7.76
2018 6 4.80

It may take a day or so for new GE vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent GE Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2023-5908 Nov 30, 2023
KEPServerEX Buffer Overflow Enables Crash / Info Leak KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.
Industrial Gateway Server
CVE-2023-5909 Nov 30, 2023
KEPServerEX Unvalidated Client Certs Enable Unauth Connections KEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect.
Industrial Gateway Server
CVE-2023-0898 Nov 07, 2023
GE MiCOM S1 Agile DLL Exec via Dir Injection General Electric MiCOM S1 Agile is vulnerable to an attacker achieving code execution by placing malicious DLL files in the directory of the application.
Micom S1 Agile
CVE-2023-4487 Sep 05, 2023
GE CIMPLICITY 2023 Local PrivEsc via Config File Injection GE CIMPLICITY 2023 is by a process control vulnerability, which could allow a local attacker to insert malicious configuration files in the expected web server execution path to escalate privileges and gain full control of the HMI software.
Cimplicity
CVE-2023-3463 Jul 19, 2023
GE Digital CIMPLICITY memory corruption via unvalidated input All versions of GE Digital CIMPLICITY that are not adhering to SDG guidance and accepting documents from untrusted sources are vulnerable to memory corruption issues due to insufficient input validation, including issues such as out-of-bounds reads and writes, use-after-free, stack-based buffer overflows, uninitialized pointers, and a heap-based buffer overflow. Successful exploitation could allow an attacker to execute arbitrary code.
Cimplicity
CVE-2023-1552 Apr 11, 2023
GE ToolboxST <7.10 Deserialization RCE Vulnerability ToolboxST prior to version 7.10 is affected by a deserialization vulnerability. An attacker with local access to an HMI or who has conducted a social engineering attack on an authorized operator could execute code in a Toolbox user's context through the deserialization of an untrusted configuration file. Two CVSS scores have been provided to capture the differences between the two aforementioned attack vectors.  Customers are advised to update to ToolboxST 7.10 which can be found in ControlST 7.10. If unable to update at this time customers should ensure they are following the guidance laid out in GE Gas Power's Secure Deployment Guide (GEH-6839). Customers should ensure they are not running ToolboxST as an Administrative user. 
Toolboxst
CVE-2022-2825 Mar 29, 2023
Remote Code Exec via Stack Buffer Overflow in Kepware KEPServerEX 6.11 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-18411.
Industrial Gateway Server
CVE-2022-2848 Mar 29, 2023
RCE in Kepware KEPServerEX 6.11.718.0 via Encoding Buffer Overflow This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16486.
Industrial Gateway Server
CVE-2023-0598 Mar 16, 2023
GE Digital Proficy iFIX v6.1/6.5/2022 Code Injection Allows Full Control GE Digital Proficy iFIX 2022, GE Digital Proficy iFIX v6.1, and GE Digital Proficy iFIX v6.5 are vulnerable to code injection, which may allow an attacker to insert malicious configuration files in the expected web server execution path and gain full control of the HMI software.
Ifix
CVE-2023-0755 Feb 23, 2023
Improper Array Index Validation Enables Remote Code Execution The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.
Digital Industrial Gateway Server
CVE-2023-0754 Feb 23, 2023
Integer Overflow in Unknown Server RCE & Crash (CVE-2023-0754) The affected products are vulnerable to an integer overflow or wraparound, which could allow an attacker to crash the server and remotely execute arbitrary code.
Digital Industrial Gateway Server
CVE-2022-38469 Jan 18, 2023
Cisco Secure Endpoint: Key Exposure Lets Decrypt Sensitive Data An unauthorized user with network access and the decryption key could decrypt sensitive data, such as usernames and passwords.
Proficy Historian
CVE-2022-43494 Jan 18, 2023
Unprivileged File Read via Path Traversal (CVE-2022-43494) An unauthorized user could be able to read any file on the system, potentially exposing sensitive information.
Proficy Historian
CVE-2022-46331 Jan 18, 2023
Linux Kernel: Privileged File Delete via Unchecked Path (CVE-2022-46331) An unauthorized user could possibly delete any file on the system.
Proficy Historian
CVE-2022-46660 Jan 18, 2023
CVE-2022-46660: Full Path Control File Write (Unknown) An unauthorized user could alter or write files with full control over the path and content of the file.
Proficy Historian
CVE-2022-46732 Jan 18, 2023
Windows Local Service Auth Bypass Allows Command Execution Even if the authentication fails for local service authentication, the requested command could still execute regardless of authentication status.
Proficy Historian
CVE-2022-43975 Jan 17, 2023
FC46-WebBridge <=3.7.6.25p0 Directory Traversal via TCP Port 8888 An issue was discovered in FC46-WebBridge on GE Grid Solutions MS3000 devices before 3.7.6.25p0_3.2.2.17p0_4.7p0. A vulnerability in the web server allows arbitrary files and configurations to be read via directory traversal over TCP port 8888.
Ms 3000 Firmware
CVE-2022-43976 Jan 17, 2023
GE Grid MS3000 FC46-WebBridge API No-Auth on TCP 8888 (pre3.7.6.25p0) An issue was discovered in FC46-WebBridge on GE Grid Solutions MS3000 devices before 3.7.6.25p0_3.2.2.17p0_4.7p0. Direct access to the API is possible on TCP port 8888 via programs located in the cgi-bin folder without any authentication.
Ms 3000 Firmware
CVE-2022-43977 Jan 17, 2023
GE Grid MS3000 debug TCP port no ACL ( v3.7.6, 3.2.2.17, 4.7) An issue was discovered on GE Grid Solutions MS3000 devices before 3.7.6.25p0_3.2.2.17p0_4.7p0. The debug port accessible via TCP (a qconn service) lacks access control.
Ms 3000 Firmware
CVE-2022-3092 Dec 08, 2022
GE CIMPICITY OOB Write Enables Remote Code Execution GE CIMPICITY versions 2022 and prior is vulnerable to an out-of-bounds write, which could allow an attacker to execute arbitrary code.
Cimplicity
CVE-2022-3084 Dec 08, 2022
GE CIMPICITY Arbitrary Code Exec via gmmiObj CGmmiRootOptionTable GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary code.
Cimplicity
CVE-2022-2952 Dec 07, 2022
GE CIMPICITY Arbitrary Code Exec via Faulting Address Flaw GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code.
Cimplicity
CVE-2022-2948 Dec 07, 2022
GE Cimplicity heap buffer overflow CVE-2022-2948 GE CIMPICITY versions 2022 and prior is vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code.
Cimplicity
CVE-2022-2002 Dec 07, 2022
GE CIMPICITY Code Flow Hijack via gmmiObj Pointer Arbitrary Code Exec GE CIMPICITY versions 2022 and prior is vulnerable when data from faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code.
Cimplicity
CVE-2022-37953 Aug 25, 2022
HTTP Response Splitting in WorkstationST < v07.09.15 An HTTP response splitting vulnerability exists in the AM Gateway Challenge-Response dialog of WorkstationST (<v07.09.15) and could allow an attacker to compromise a victim's browser/session. WorkstationST is only deployed in specific, controlled environments rendering attack complexity significantly higher than if the attack were conducted on the software in isolation. WorkstationST v07.09.15 can be found in ControlST v07.09.07 SP8 and greater.
Workstationst
CVE-2022-37952 Aug 25, 2022
XSS in WorkstationST iHistorian DD (before 07.09.15) A reflected cross-site scripting (XSS) vulnerability exists in the iHistorian Data Display of WorkstationST (<v07.09.15) could allow an attacker to compromise a victim's browser. WorkstationST is only deployed in specific, controlled environments rendering attack complexity significantly higher than if the attack were conducted on the software in isolation. WorkstationST v07.09.15 can be found in ControlST v07.09.07 SP8 and greater.
Workstationst
CVE-2021-44477 Mar 25, 2022
GE Gas Power ToolBoxST Version v04.07.05C suffers from an XML external entity (XXE) vulnerability using the DTD parameter entities technique GE Gas Power ToolBoxST Version v04.07.05C suffers from an XML external entity (XXE) vulnerability using the DTD parameter entities technique that could result in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the XML project/template file.
Toolboxst
CVE-2021-27430 Mar 23, 2022
GE UR bootloader binary Version 7.00, 7.01 and 7.02 included unused hardcoded credentials GE UR bootloader binary Version 7.00, 7.01 and 7.02 included unused hardcoded credentials. Additionally, a user with physical access to the UR IED can interrupt the boot sequence by rebooting the UR.
Ur Bootloader Binary
CVE-2022-23921 Feb 25, 2022
Exploitation of this vulnerability may result in local privilege escalation and code execution Exploitation of this vulnerability may result in local privilege escalation and code execution. GE maintains exploitation of this vulnerability is only possible if the attacker has login access to a machine actively running CIMPLICITY, the CIMPLICITY server is not already running a project, and the server is licensed for multiple projects.
Proficy Cimplicitiy
CVE-2022-21798 Feb 25, 2022
The affected product is vulnerable due to cleartext transmission of credentials seen in the CIMPLICITY network The affected product is vulnerable due to cleartext transmission of credentials seen in the CIMPLICITY network, which can be easily spoofed and used to log in to make operational changes to the system.
Cimplicity
CVE-2019-18243 Feb 18, 2021
HMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through the registry HMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through the registry. This may allow privilege escalation.
Ifix
CVE-2019-18255 Feb 18, 2021
HMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through section objects HMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through section objects. This may allow privilege escalation.
Ifix
CVE-2020-16240 Sep 23, 2020
GE Digital APM Classic, Versions 4.4 and prior GE Digital APM Classic, Versions 4.4 and prior. An insecure direct object reference (IDOR) vulnerability allows user account data to be downloaded in JavaScript object notation (JSON) format by users who should not have access to such functionality. An attacker can download sensitive data related to user accounts without having the proper privileges.
Asset Performance Management Classic
CVE-2020-16244 Sep 23, 2020
GE Digital APM Classic, Versions 4.4 and prior GE Digital APM Classic, Versions 4.4 and prior. Salt is not used for hash calculation of passwords, making it possible to decrypt passwords. This design flaw, along with the IDOR vulnerability, puts the entire platform at high risk because an authenticated user can retrieve all user account data and then retrieve the actual passwords.
Asset Performance Management Classic
CVE-2020-6992 Apr 15, 2020
A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and prior A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and prior. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session. GE Digital CIMPLICITY v11.0, released January 2020, contains mitigation for this local privilege escalation vulnerability. GE Digital recommends all users upgrade to GE CIMPLICITY v11.0 or newer.
Cimplicity
CVE-2019-13554 Apr 07, 2020
GE Mark VIe Controller has an unsecured Telnet protocol GE Mark VIe Controller has an unsecured Telnet protocol that may allow a user to create an authenticated session using generic default credentials. GE recommends that users disable the Telnet service.
Mark Vie Control System
CVE-2019-13559 Apr 07, 2020
GE Mark VIe Controller is shipped with pre-configured hard-coded credentials that may allow root-user access to the controller GE Mark VIe Controller is shipped with pre-configured hard-coded credentials that may allow root-user access to the controller. A limited application of the affected product may ship without setup and configuration instructions immediately available to the end user. The bulk of controllers go into applications requiring the GE commissioning engineer to change default configurations during the installation process. GE recommends that users reset controller passwords during installation in the operating environment.
Mark Vie Controll System
CVE-2020-6977 Feb 20, 2020
A restricted desktop environment escape vulnerability exists in the Kiosk Mode functionality of affected devices A restricted desktop environment escape vulnerability exists in the Kiosk Mode functionality of affected devices. Specially crafted inputs can allow the user to escape the restricted environment, resulting in access to the underlying operating system. Affected devices include the following GE Ultrasound Products: Vivid products - all versions; LOGIQ - all versions not including LOGIQ 100 Pro; Voluson - all versions; Versana Essential - all versions; Invenia ABUS Scan station - all versions; Venue - all versions not including Venue 40 R1-3 and Venue 50 R4-5
CVE-2019-6564 May 09, 2019
GE Communicator, all versions prior to 4.0.517 GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to place malicious files within the installer file directory, which may allow an attacker to gain administrative privileges on a system during installation or upgrade.
Ge Communicator
CVE-2019-6544 May 09, 2019
GE Communicator, all versions prior to 4.0.517, has a service running with system privileges GE Communicator, all versions prior to 4.0.517, has a service running with system privileges that may allow an unprivileged user to perform certain administrative actions, which may allow the execution of scheduled scripts with system administrator privileges. This service is inaccessible to attackers if Windows default firewall settings are used by the end user.
Ge Communicator
CVE-2019-6546 May 09, 2019
GE Communicator, all versions prior to 4.0.517 GE Communicator, all versions prior to 4.0.517, allows an attacker to place malicious files within the working directory of the program, which may allow an attacker to manipulate widgets and UI elements.
Ge Communicator
CVE-2019-6548 May 09, 2019
GE Communicator, all versions prior to 4.0.517, contains two backdoor accounts with hardcoded credentials, which may GE Communicator, all versions prior to 4.0.517, contains two backdoor accounts with hardcoded credentials, which may allow control over the database. This service is inaccessible to attackers if Windows default firewall settings are used by the end user.
Ge Communicator
CVE-2019-6566 May 09, 2019
GE Communicator, all versions prior to 4.0.517 GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to replace the uninstaller with a malicious version, which could allow an attacker to gain administrator privileges to the system.
Ge Communicator
CVE-2018-15362 Dec 07, 2018
XXE in GE Proficy Cimplicity GDS versions 9.0 R2 XXE in GE Proficy Cimplicity GDS versions 9.0 R2, 9.5, 10.0
Cimplicity
CVE-2018-17925 Oct 10, 2018
Multiple instances of this vulnerability (Unsafe ActiveX Control Marked Safe For Scripting) have been identified in the third-party ActiveX object provided to GE iFIX versions 2.0 - 5.8 by Gigasoft Multiple instances of this vulnerability (Unsafe ActiveX Control Marked Safe For Scripting) have been identified in the third-party ActiveX object provided to GE iFIX versions 2.0 - 5.8 by Gigasoft. Only the independent use of the Gigasoft charting package outside the iFIX product may expose users to the reported vulnerability. The reported method shown to impact Internet Explorer is not exposed in the iFIX product, nor is the core functionality of the iFIX product known to be impacted.
Ifix
CVE-2017-7908 Oct 02, 2018
A heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and prior A heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and prior. A malicious HTML file that loads the ActiveX controls can trigger the vulnerability via unchecked function calls.
Ge Communicator
CVE-2018-10613 Jun 04, 2018
Multiple variants of XML External Entity (XXE) attacks may be used to exfiltrate data Multiple variants of XML External Entity (XXE) attacks may be used to exfiltrate data from the host Windows platform in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior.
Mds Pulsenet
CVE-2018-10611 Jun 04, 2018
Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to allow unauthenticated users to launch applications and support remote code execution through web services.
Mds Pulsenet
CVE-2018-10615 Jun 04, 2018
Directory traversal may lead to files being exfiltrated or deleted on the GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior host platform. Directory traversal may lead to files being exfiltrated or deleted on the GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior host platform.
Mds Pulsenet
CVE-2015-3976 Aug 28, 2017
Cross-site scripting (XSS) vulnerability in GE Multilink ML810/3000/3100 series switch 5.2.0 and earlier Cross-site scripting (XSS) vulnerability in GE Multilink ML810/3000/3100 series switch 5.2.0 and earlier, and GE Multilink ML800/1200/1600/2400 4.2.1 and earlier.
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.