Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1762: CWE-23 in GE Vernova Enervista

0
Low
VulnerabilityCVE-2026-1762cvecve-2026-1762cwe-23
Published: Tue Feb 10 2026 (02/10/2026, 20:06:00 UTC)
Source: CVE Database V5
Vendor/Project: GE Vernova
Product: Enervista

Description

A vulnerability in GE Vernova Enervista UR Setup on Windows allows File Manipulation.This issue affects Enervista: 8.6 and prior versions.

AI-Powered Analysis

AILast updated: 02/10/2026, 20:31:22 UTC

Technical Analysis

CVE-2026-1762 identifies a directory traversal vulnerability (CWE-23) in GE Vernova Enervista UR Setup software running on Windows platforms, specifically affecting versions 8.6 and earlier. This vulnerability arises from insufficient validation of file paths, allowing an attacker with high privileges to manipulate files outside the intended directories. The attack vector is remote but requires privileges (PR:H), meaning the attacker must have authenticated access with elevated rights. No user interaction is necessary (UI:N), and the scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component without impacting other system components. The CVSS 3.1 base score is 2.9, reflecting low severity due to limited confidentiality impact (C:N), but with potential integrity (I:L) and availability (A:L) consequences. The vulnerability could allow modification or deletion of critical files, potentially disrupting system operations or causing denial of service. No public exploits or patches are currently available, emphasizing the need for proactive risk management. The vulnerability is particularly relevant for organizations relying on GE Vernova Enervista for energy management and monitoring, as file manipulation could affect operational data and system stability.

Potential Impact

For European organizations, especially those in the energy sector using GE Vernova Enervista, this vulnerability could lead to unauthorized modification or deletion of configuration or operational files, impacting system integrity and availability. Although confidentiality is not directly affected, the disruption of energy management systems could cause operational downtime or inaccurate monitoring, potentially leading to broader infrastructure issues. The requirement for high privileges limits exploitation to insiders or attackers who have already compromised user credentials, reducing the likelihood of widespread attacks. However, given the critical nature of energy infrastructure in Europe, even low-severity vulnerabilities warrant attention to prevent cascading effects. Organizations may face regulatory scrutiny if disruptions occur, particularly under EU directives on critical infrastructure protection. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

Organizations should immediately inventory their GE Vernova Enervista installations to identify affected versions (8.6 and prior). Until a vendor patch is released, restrict access to the Enervista UR Setup application to only trusted administrators with a need-to-know basis, minimizing exposure to privileged accounts. Implement strict network segmentation to isolate energy management systems from general IT networks and external access. Employ file integrity monitoring to detect unauthorized changes to critical files and configurations. Regularly audit user privileges and enforce the principle of least privilege to reduce the risk of insider threats. Monitor logs for unusual file access or modification activities. Engage with GE Vernova support to obtain updates on patch availability and apply them promptly once released. Additionally, develop incident response plans tailored to potential disruptions in energy management systems to ensure rapid recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GE_Vernova
Date Reserved
2026-02-02T14:36:44.351Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b92154b57a58fa127f93f

Added to database: 2/10/2026, 8:16:21 PM

Last enriched: 2/10/2026, 8:31:22 PM

Last updated: 2/20/2026, 11:38:14 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats