GE MDS PulseNET Vulnerabilities
GE MDS PulseNET contains multiple authentication bypass vulnerabilities (CWE-798: hardcoded credentials, CWE-23: path traversal) in versions 3.1.3 and earlier. These allow unauthenticated attackers with network access to the management interface to gain administrative-level access to SCADA monitoring and control functions. The product is end-of-life with no vendor patches available. MDS PulseNET is used to remotely manage and monitor RTUs, communications hardware, and distribution automation in utility networks.
- Network access to MDS PulseNET management interface (typically port 80/443 or proprietary port)
- No valid credentials required due to authentication bypass
- Target must be running MDS PulseNET or MDS PulseNET Enterprise version 3.1.3 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/18f2492d-457a-4f4c-adce-77183ff3439eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.