GE Mark VIe Controller
GE Mark VIe Controller contains authentication and credential management vulnerabilities (CWE-285, CWE-798) affecting all versions. The vulnerability allows an attacker with local access and default or weak credentials to create read/write/execute commands within the Mark VIe control system. The primary attack vectors are enabled Telnet service (which has no encryption) and unchanged default passwords. GE has not released a firmware patch for this vulnerability; remediation relies on configuration changes and compensating controls. No known public exploits exist, and the vulnerability is not remotely exploitable.
- Local or network access to the Mark VIe controller (not remotely exploitable)
- Default or weak controller credentials (unchanged after deployment)
- Telnet service enabled (default on Control*ST versions earlier than v6.0)
/api/v1/advisories/488c3c4e-86f7-4d53-a837-b2db166ecd21Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.