GE PACSystems CPE305/310, CPE330, CPE400, RSTi-EP CPE 100, CPU320/CRU320, RXi
The vulnerability is caused by improper input validation in GE PACSystems and RSTi-EP CPUs. An attacker who can reach the device on the network can send a crafted message that causes the device to reboot and change state, rendering it unavailable. This affects PACSystems CPE305/310/330/400, RSTi-EP CPE100, CPU320/CRU320, and RXi models. GE has released firmware updates for CPE305, CPE310, CPE330, and CPE400. CPU320/CRU320 is end-of-life with no patch available; GE recommends migration to supported models. CPE100 firmware is available from GE Digital support.
- Network access to the PLC on its service port or network interface
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fccae455-c414-486f-b688-21ca85d92d91Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.