Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1763: Vulnerability in GE Vernova Enervista

0
Medium
VulnerabilityCVE-2026-1763cvecve-2026-1763
Published: Tue Feb 10 2026 (02/10/2026, 20:06:12 UTC)
Source: CVE Database V5
Vendor/Project: GE Vernova
Product: Enervista

Description

Vulnerability in GE Vernova Enervista UR Setup on Windows.This issue affects Enervista: 8.6 and previous versions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/07/2026, 21:07:03 UTC

Technical Analysis

CVE-2026-1763 identifies a vulnerability in GE Vernova Enervista UR Setup running on Windows platforms, affecting versions 8.6 and earlier. The vulnerability is categorized under CWE-35, indicating a path traversal issue, which typically allows attackers to access files and directories outside the intended scope. The CVSS v3.1 vector (AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N) reveals that the attack requires physical or local access (AV:P), low attack complexity (AC:L), and high privileges (PR:H) but no user interaction (UI:N). The scope remains unchanged (S:U). The impact on confidentiality is low, but the integrity impact is high, meaning an attacker could modify critical files or configurations, potentially compromising system trustworthiness. Availability is unaffected. No patches or known exploits are currently published, but the vulnerability poses a risk to environments where Enervista is deployed, especially in industrial control or energy management contexts. The vulnerability's exploitation could lead to unauthorized modification of system components, potentially disrupting operations or enabling further attacks.

Potential Impact

The vulnerability primarily threatens the integrity of systems running GE Vernova Enervista UR Setup by enabling attackers with high privileges to perform unauthorized modifications via path traversal. Although confidentiality impact is limited, the ability to alter critical files or configurations can undermine system reliability and trust. Since exploitation requires high privileges and local or physical access, remote exploitation risk is low, reducing the threat surface. However, in industrial or energy sectors where Enervista is used for control and monitoring, integrity breaches can lead to operational disruptions, safety hazards, or cascading failures. The absence of availability impact means systems remain operational but potentially compromised. Organizations worldwide relying on Enervista for energy management or industrial automation could face increased risk of sabotage or insider threats if this vulnerability is exploited.

Mitigation Recommendations

Organizations should immediately inventory their GE Vernova Enervista installations to identify affected versions (8.6 and earlier). Although no official patch is currently available, they should monitor GE Vernova advisories for updates and apply patches promptly once released. In the interim, restrict access to systems running Enervista UR Setup to trusted administrators only, enforcing the principle of least privilege to minimize the number of users with high-level access. Implement strict physical security controls to prevent unauthorized local access. Employ application whitelisting and integrity monitoring to detect unauthorized file modifications. Network segmentation should isolate critical Enervista systems from less secure networks. Conduct regular audits of system configurations and logs to identify suspicious activities. Additionally, consider deploying endpoint detection and response (EDR) solutions capable of detecting anomalous behavior related to file system access or privilege misuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GE_Vernova
Date Reserved
2026-02-02T14:36:45.715Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b92154b57a58fa127f942

Added to database: 2/10/2026, 8:16:21 PM

Last enriched: 3/7/2026, 9:07:03 PM

Last updated: 4/6/2026, 6:23:16 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses