Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1762: CWE-23 in GE Vernova Enervista

0
Low
VulnerabilityCVE-2026-1762cvecve-2026-1762cwe-23
Published: Tue Feb 10 2026 (02/10/2026, 20:06:00 UTC)
Source: CVE Database V5
Vendor/Project: GE Vernova
Product: Enervista

Description

A vulnerability in GE Vernova Enervista UR Setup on Windows allows File Manipulation.This issue affects Enervista: 8.6 and prior versions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:29:34 UTC

Technical Analysis

CVE-2026-1762 identifies a path traversal or file manipulation vulnerability classified under CWE-23 in the GE Vernova Enervista UR Setup software running on Windows platforms. This vulnerability affects Enervista versions 8.6 and earlier. The flaw allows an attacker with high-level privileges on the system to manipulate files improperly, potentially overwriting or modifying critical files within the application or system directories. The vulnerability requires local access with privileged credentials, does not require user interaction, and does not expose confidential information. The CVSS v3.1 base score is 2.9, reflecting low severity due to the need for high privileges and limited impact scope. The vulnerability could lead to integrity and availability issues, such as corrupting configuration files or disrupting service functionality. No public exploits or patches are currently known or available. The vulnerability was published on February 10, 2026, and is assigned by GE Vernova. Given the nature of the software—used primarily in energy management and utility sectors—this vulnerability could be leveraged in targeted attacks if combined with other exploits or insider threats.

Potential Impact

The primary impact of CVE-2026-1762 is on the integrity and availability of systems running GE Vernova Enervista UR Setup. An attacker with high privileges could manipulate files to disrupt normal operations, potentially causing service interruptions or configuration corruption. While confidentiality is not directly impacted, the disruption could affect critical infrastructure operations, especially in energy and utility sectors where Enervista is deployed. The requirement for local privileged access limits the attack surface, reducing the likelihood of widespread exploitation. However, in environments where privileged access is not tightly controlled, this vulnerability could facilitate insider threats or be part of a multi-stage attack. The absence of known exploits and patches currently lowers immediate risk, but organizations should remain vigilant due to the critical nature of affected systems.

Mitigation Recommendations

To mitigate CVE-2026-1762 effectively, organizations should implement strict access controls limiting administrative and privileged access to only trusted personnel. Employ robust monitoring and alerting on file system changes within the Enervista installation directories to detect unauthorized manipulations early. Use application whitelisting and integrity verification tools to ensure critical files are not altered unexpectedly. Regularly audit user privileges and remove unnecessary elevated rights. Segregate Enervista systems from general user environments to reduce exposure. Maintain up-to-date backups of configuration and critical files to enable rapid recovery if manipulation occurs. Engage with GE Vernova support channels to track patch releases and apply updates promptly once available. Additionally, consider deploying endpoint detection and response (EDR) solutions to identify suspicious activities related to file manipulation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GE_Vernova
Date Reserved
2026-02-02T14:36:44.351Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b92154b57a58fa127f93f

Added to database: 2/10/2026, 8:16:21 PM

Last enriched: 3/5/2026, 9:29:34 AM

Last updated: 4/6/2026, 5:08:13 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses