An unauthorized user could possibly delete any file on the system.
Max CVSS
8.1
EPSS Score
0.07%
Published
2023-01-18
Updated
2023-07-07
An unauthorized user could be able to read any file on the system, potentially exposing sensitive information.
Max CVSS
7.5
EPSS Score
0.06%
Published
2023-01-18
Updated
2023-07-06
A vulnerability classified as problematic has been found in GE Voluson S8. Affected is the file /uscgi-bin/users.cgi of the Service Browser. The manipulation leads to improper authentication and elevated access possibilities. It is possible to launch the attack on the local host.
Max CVSS
7.8
EPSS Score
0.04%
Published
2022-06-17
Updated
2022-06-30
GE Mark VIe Controller has an unsecured Telnet protocol that may allow a user to create an authenticated session using generic default credentials. GE recommends that users disable the Telnet service.
Max CVSS
8.8
EPSS Score
0.10%
Published
2020-04-07
Updated
2020-10-09
In GE Aestiva and Aespire versions 7100 and 7900, a vulnerability exists where serial devices are connected via an added unsecured terminal server to a TCP/IP network configuration, which could allow an attacker to remotely modify device configuration and silence alarms.
Max CVSS
5.3
EPSS Score
0.08%
Published
2019-07-10
Updated
2020-10-02
GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to replace the uninstaller with a malicious version, which could allow an attacker to gain administrator privileges to the system.
Max CVSS
7.8
EPSS Score
0.04%
Published
2019-05-09
Updated
2020-10-16
GE Communicator, all versions prior to 4.0.517, has a service running with system privileges that may allow an unprivileged user to perform certain administrative actions, which may allow the execution of scheduled scripts with system administrator privileges. This service is inaccessible to attackers if Windows default firewall settings are used by the end user.
Max CVSS
6.8
EPSS Score
0.09%
Published
2019-05-09
Updated
2020-10-16
Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to allow unauthenticated users to launch applications and support remote code execution through web services.
Max CVSS
9.8
EPSS Score
4.00%
Published
2018-06-04
Updated
2019-10-09
GE Centricity PACS RA1000, diagnostic image analysis, all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.
Max CVSS
9.8
EPSS Score
0.23%
Published
2018-03-20
Updated
2019-10-09
GE Xeleris versions 1.0,1.1,2.1,3.0,3.1, medical imaging systems, all current versions are affected, these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.
Max CVSS
9.8
EPSS Score
0.36%
Published
2018-03-20
Updated
2019-10-09
GE GEMNet License server (EchoServer) all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.
Max CVSS
9.8
EPSS Score
0.36%
Published
2018-03-20
Updated
2019-10-09
GE Infinia/Infinia with Hawkeye 4 medical imaging systems all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.
Max CVSS
10.0
EPSS Score
0.23%
Published
2018-03-20
Updated
2019-10-09
General Electric (GE) Bently Nevada 3500/22M USB with firmware before 5.0 and Bently Nevada 3500/22M Serial have open ports, which makes it easier for remote attackers to obtain privileged access via unspecified vectors.
Max CVSS
10.0
EPSS Score
0.85%
Published
2016-11-25
Updated
2016-11-28
13 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!