GE MDS PulseNET and MDS PulseNET Enterprise
GE PulseNET and PulseNET Enterprise versions 3.2.1 and earlier contain authentication bypass and XML external entity (XXE) injection vulnerabilities. The product fails to properly validate user credentials (CWE-287), allowing unauthenticated access to administrative functions. Additionally, improper XML parsing (CWE-611) enables attackers to read arbitrary files or execute code on the host server. Path traversal issues (CWE-23) may also allow access to restricted files. Exploitation requires only network connectivity to the PulseNET web interface and can result in privilege escalation and data theft.
- Network access to the PulseNET web server (default HTTP/HTTPS port)
- No valid credentials required for initial exploitation
- PulseNET version 3.2.1 or earlier running on vulnerable configuration
Patching may require device reboot — plan for process interruption
/api/v1/advisories/30b5b1e9-7977-4dc9-9299-5ea0e1d22e0aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.