CVE-2025-27253: CWE-15 External Control of System or Configuration Setting in GE Vernova N60 multilin
A CWE-15 "External Control of System or Configuration Setting" in GE Vernova UR IED family devices from version 7.0 up to 8.60 allows an attacker to provide input that establishes a TCP connection through a port forwarding. The lack of the IP address and port validation may allow the attacker to bypass firewall rules or to send malicious traffic in the network.
AI Analysis
Technical Summary
CVE-2025-27253 is a vulnerability classified under CWE-15 (External Control of System or Configuration Setting) found in GE Vernova's N60 Multilin devices, specifically in versions from 7.0 up to 8.60. The flaw arises because the device improperly validates IP addresses and port numbers when establishing TCP connections through port forwarding. This lack of validation allows an attacker with network access to the device to manipulate configuration settings to create unauthorized TCP connections. By doing so, the attacker can bypass firewall rules that would normally restrict traffic, enabling malicious traffic to traverse the network undetected. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The CVSS v3.1 score is 6.1 (medium severity), reflecting the attack vector as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) with limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). Although no exploits have been reported in the wild, the vulnerability could be leveraged to facilitate lateral movement within critical infrastructure networks or to exfiltrate data by circumventing network controls. The affected product, GE Vernova N60 Multilin, is widely used in industrial control systems, particularly in energy and utility sectors, making this a significant concern for operational technology (OT) environments. The vulnerability highlights the risks of insufficient input validation in configuration interfaces of critical devices, emphasizing the need for strict controls and monitoring in OT networks.
Potential Impact
For European organizations, especially those in the energy, utilities, and industrial sectors, this vulnerability presents a risk of unauthorized network access and potential disruption of critical infrastructure operations. By exploiting this flaw, attackers could bypass firewall protections, enabling lateral movement within internal networks or injection of malicious traffic that could degrade device performance or availability. This could lead to partial denial of service or exposure of sensitive operational data, impacting confidentiality and availability. Given the strategic importance of energy infrastructure in Europe and the reliance on GE Vernova devices in many facilities, successful exploitation could have cascading effects on grid stability and service continuity. Additionally, the vulnerability could be leveraged as a foothold for more advanced attacks targeting industrial control systems. The medium severity rating reflects the balance between the ease of exploitation and the limited direct impact on integrity, but the potential for broader network compromise elevates the concern for European critical infrastructure operators.
Mitigation Recommendations
1. Apply patches and firmware updates from GE Vernova as soon as they become available to address the vulnerability directly. 2. Restrict network access to the management interfaces of N60 Multilin devices using network segmentation and access control lists (ACLs) to limit exposure to trusted hosts only. 3. Implement strict firewall rules that monitor and control port forwarding configurations and prevent unauthorized changes. 4. Deploy network intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous TCP forwarding or unusual connection patterns related to these devices. 5. Conduct regular configuration audits and integrity checks on N60 Multilin devices to detect unauthorized modifications. 6. Use network segmentation to isolate operational technology (OT) environments from corporate IT networks, reducing the attack surface. 7. Train operational staff to recognize signs of network anomalies and suspicious device behavior. 8. Establish incident response procedures specific to OT environments to quickly contain and remediate potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2025-27253: CWE-15 External Control of System or Configuration Setting in GE Vernova N60 multilin
Description
A CWE-15 "External Control of System or Configuration Setting" in GE Vernova UR IED family devices from version 7.0 up to 8.60 allows an attacker to provide input that establishes a TCP connection through a port forwarding. The lack of the IP address and port validation may allow the attacker to bypass firewall rules or to send malicious traffic in the network.
AI-Powered Analysis
Technical Analysis
CVE-2025-27253 is a vulnerability classified under CWE-15 (External Control of System or Configuration Setting) found in GE Vernova's N60 Multilin devices, specifically in versions from 7.0 up to 8.60. The flaw arises because the device improperly validates IP addresses and port numbers when establishing TCP connections through port forwarding. This lack of validation allows an attacker with network access to the device to manipulate configuration settings to create unauthorized TCP connections. By doing so, the attacker can bypass firewall rules that would normally restrict traffic, enabling malicious traffic to traverse the network undetected. The vulnerability does not require any authentication or user interaction, increasing its risk profile. The CVSS v3.1 score is 6.1 (medium severity), reflecting the attack vector as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) with limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). Although no exploits have been reported in the wild, the vulnerability could be leveraged to facilitate lateral movement within critical infrastructure networks or to exfiltrate data by circumventing network controls. The affected product, GE Vernova N60 Multilin, is widely used in industrial control systems, particularly in energy and utility sectors, making this a significant concern for operational technology (OT) environments. The vulnerability highlights the risks of insufficient input validation in configuration interfaces of critical devices, emphasizing the need for strict controls and monitoring in OT networks.
Potential Impact
For European organizations, especially those in the energy, utilities, and industrial sectors, this vulnerability presents a risk of unauthorized network access and potential disruption of critical infrastructure operations. By exploiting this flaw, attackers could bypass firewall protections, enabling lateral movement within internal networks or injection of malicious traffic that could degrade device performance or availability. This could lead to partial denial of service or exposure of sensitive operational data, impacting confidentiality and availability. Given the strategic importance of energy infrastructure in Europe and the reliance on GE Vernova devices in many facilities, successful exploitation could have cascading effects on grid stability and service continuity. Additionally, the vulnerability could be leveraged as a foothold for more advanced attacks targeting industrial control systems. The medium severity rating reflects the balance between the ease of exploitation and the limited direct impact on integrity, but the potential for broader network compromise elevates the concern for European critical infrastructure operators.
Mitigation Recommendations
1. Apply patches and firmware updates from GE Vernova as soon as they become available to address the vulnerability directly. 2. Restrict network access to the management interfaces of N60 Multilin devices using network segmentation and access control lists (ACLs) to limit exposure to trusted hosts only. 3. Implement strict firewall rules that monitor and control port forwarding configurations and prevent unauthorized changes. 4. Deploy network intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous TCP forwarding or unusual connection patterns related to these devices. 5. Conduct regular configuration audits and integrity checks on N60 Multilin devices to detect unauthorized modifications. 6. Use network segmentation to isolate operational technology (OT) environments from corporate IT networks, reducing the attack surface. 7. Train operational staff to recognize signs of network anomalies and suspicious device behavior. 8. Establish incident response procedures specific to OT environments to quickly contain and remediate potential exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Nozomi
- Date Reserved
- 2025-02-21T08:32:26.973Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e52419a677756fc9926603
Added to database: 10/7/2025, 2:30:49 PM
Last enriched: 10/7/2025, 2:45:36 PM
Last updated: 1/7/2026, 4:53:09 AM
Views: 120
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.