GE UR family
GE UR family devices contain multiple critical vulnerabilities affecting firmware versions below 8.1x: unvalidated firmware upload capability allowing attackers to install malicious code, weak SSH implementation in versions 7.4x–8.0x, inadequate Factory Mode protections, web server vulnerabilities, exposure of system register data including keystroke history, and bootloader flaws in versions below 7.03/7.04. Successful exploitation could allow unauthorized access to sensitive information, device reboot/denial-of-service, or privileged command execution that could alter protective relay settings or disable protective functions.
- Network access to the UR device (same subnet or routable path)
- Device running firmware version below 8.1x for most vulnerabilities
- Device with firmware 7.4x to 8.0x for SSH-related issues
- No valid credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e939d3f8-fb33-4187-9512-3147d8ccaedfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.