Vulnerability Details : CVE-2018-10611
Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to allow unauthenticated users to launch applications and support remote code execution through web services.
Vulnerability category: Execute codeBypassGain privilege
Products affected by CVE-2018-10611
- cpe:2.3:a:ge:mds_pulsenet:*:*:*:*:*:*:*:*
- cpe:2.3:a:ge:mds_pulsenet:*:*:*:*:enterprise:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-10611
6.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 91 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-10611
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2018-10611
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by:
- ics-cert@hq.dhs.gov (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2018-10611
-
https://ics-cert.us-cert.gov/advisories/ICSA-18-151-02
GE MDS PulseNET and MDS PulseNET Enterprise | CISAThird Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/104377
Multiple GE MDS PulseNET Products Multiple Security vulnerabilitiesThird Party Advisory;VDB Entry
-
http://www.gegridsolutions.com/app/DownloadFile.aspx?prod=pulsenet&type=9&file=1
Grid Passport Login : GE Grid SolutionsPermissions Required
Jump to