CVE-2026-1763 (GCVE-0-2026-1763)

Vulnerability from cvelistv5 – Published: 2026-02-10 20:06 – Updated: 2026-02-10 20:29
VLAI?
Title
Enervista UR Setup DLL Hijacking
Summary
Vulnerability in GE Vernova Enervista UR Setup on Windows.This issue affects Enervista: 8.6 and previous versions.
Assigner
Impacted products
Vendor Product Version
GE Vernova Enervista Affected: 8.6 and previous versions
Create a notification for this product.
Credits
Reid Wightman
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-1763",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-10T20:29:35.281884Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-10T20:29:43.312Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "UR Setup",
          "platforms": [
            "Windows"
          ],
          "product": "Enervista",
          "vendor": "GE Vernova",
          "versions": [
            {
              "status": "affected",
              "version": "8.6 and previous versions"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Reid Wightman"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Vulnerability in GE Vernova Enervista UR Setup on Windows.\u003cp\u003eThis issue affects Enervista: 8.6 and previous versions.\u003c/p\u003e"
            }
          ],
          "value": "Vulnerability in GE Vernova Enervista UR Setup on Windows.This issue affects Enervista: 8.6 and previous versions."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-10T20:06:12.992Z",
        "orgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
        "shortName": "GE_Vernova"
      },
      "references": [
        {
          "url": "https://www.gevernova.com/grid-solutions/passport/login?destination=resources%3Fprod%3Durfamily%26type%3D21%26node_id%3D4987%26check_logged_in%3D1"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The EnerVista URPC installation software versions prior to 8.70, used an incorrect method of \nloading the DLL (dynamic Link Library) file by referencing it relative to the location of the installation \nfolder. If the system in which the software is installed gets compromised, an attacker could exploit \nthis weakness and replace the legitimate DLL with a malicious file. \u003cbr\u003e\u003cbr\u003e\nThe EnerVista UR Setup software installation has been upgraded to address this vulnerability. \n\n\u003cbr\u003e"
            }
          ],
          "value": "The EnerVista URPC installation software versions prior to 8.70, used an incorrect method of \nloading the DLL (dynamic Link Library) file by referencing it relative to the location of the installation \nfolder. If the system in which the software is installed gets compromised, an attacker could exploit \nthis weakness and replace the legitimate DLL with a malicious file. \n\n\nThe EnerVista UR Setup software installation has been upgraded to address this vulnerability."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Enervista UR Setup DLL Hijacking",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "As a workaround, GE Vernova recommends having secure infrastructure in place, which can protect the \nsystem. We also recommend that customers protect their digital devices using a defense-in-depth \nstrategy. This includes, but is not limited to, placing digital devices inside the control system network \nsecurity perimeter, access controls, robust network monitoring (such as Intrusion Detection System) and \nother mitigation techniques in place. Please refer to the product secure deployment guide. \n\n\n\u003cbr\u003e\u003cbr\u003e\n\nIt is essential for organizations to prioritize cybersecurity measures, including regular vulnerability \nassessments and prompt application of security patches. \n\n\u003cbr\u003e"
            }
          ],
          "value": "As a workaround, GE Vernova recommends having secure infrastructure in place, which can protect the \nsystem. We also recommend that customers protect their digital devices using a defense-in-depth \nstrategy. This includes, but is not limited to, placing digital devices inside the control system network \nsecurity perimeter, access controls, robust network monitoring (such as Intrusion Detection System) and \nother mitigation techniques in place. Please refer to the product secure deployment guide. \n\n\n\n\n\n\nIt is essential for organizations to prioritize cybersecurity measures, including regular vulnerability \nassessments and prompt application of security patches."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2cf0fb33-79e2-44e0-beb8-826cc5ce3250",
    "assignerShortName": "GE_Vernova",
    "cveId": "CVE-2026-1763",
    "datePublished": "2026-02-10T20:06:12.992Z",
    "dateReserved": "2026-02-02T14:36:45.715Z",
    "dateUpdated": "2026-02-10T20:29:43.312Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-1763\",\"sourceIdentifier\":\"GEPowerCVD@ge.com\",\"published\":\"2026-02-10T20:16:53.073\",\"lastModified\":\"2026-02-10T21:51:48.077\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in GE Vernova Enervista UR Setup on Windows.This issue affects Enervista: 8.6 and previous versions.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"GEPowerCVD@ge.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N\",\"baseScore\":4.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.3,\"impactScore\":4.2}]},\"references\":[{\"url\":\"https://www.gevernova.com/grid-solutions/passport/login?destination=resources%3Fprod%3Durfamily%26type%3D21%26node_id%3D4987%26check_logged_in%3D1\",\"source\":\"GEPowerCVD@ge.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-1763\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-10T20:29:35.281884Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-10T20:29:39.156Z\"}}], \"cna\": {\"title\": \"Enervista UR Setup DLL Hijacking\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Reid Wightman\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.6, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"GE Vernova\", \"product\": \"Enervista\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.6 and previous versions\"}], \"platforms\": [\"Windows\"], \"packageName\": \"UR Setup\", \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"The EnerVista URPC installation software versions prior to 8.70, used an incorrect method of \\nloading the DLL (dynamic Link Library) file by referencing it relative to the location of the installation \\nfolder. If the system in which the software is installed gets compromised, an attacker could exploit \\nthis weakness and replace the legitimate DLL with a malicious file. \\n\\n\\nThe EnerVista UR Setup software installation has been upgraded to address this vulnerability.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"The EnerVista URPC installation software versions prior to 8.70, used an incorrect method of \\nloading the DLL (dynamic Link Library) file by referencing it relative to the location of the installation \\nfolder. If the system in which the software is installed gets compromised, an attacker could exploit \\nthis weakness and replace the legitimate DLL with a malicious file. \u003cbr\u003e\u003cbr\u003e\\nThe EnerVista UR Setup software installation has been upgraded to address this vulnerability. \\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.gevernova.com/grid-solutions/passport/login?destination=resources%3Fprod%3Durfamily%26type%3D21%26node_id%3D4987%26check_logged_in%3D1\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"As a workaround, GE Vernova recommends having secure infrastructure in place, which can protect the \\nsystem. We also recommend that customers protect their digital devices using a defense-in-depth \\nstrategy. This includes, but is not limited to, placing digital devices inside the control system network \\nsecurity perimeter, access controls, robust network monitoring (such as Intrusion Detection System) and \\nother mitigation techniques in place. Please refer to the product secure deployment guide. \\n\\n\\n\\n\\n\\n\\nIt is essential for organizations to prioritize cybersecurity measures, including regular vulnerability \\nassessments and prompt application of security patches.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"As a workaround, GE Vernova recommends having secure infrastructure in place, which can protect the \\nsystem. We also recommend that customers protect their digital devices using a defense-in-depth \\nstrategy. This includes, but is not limited to, placing digital devices inside the control system network \\nsecurity perimeter, access controls, robust network monitoring (such as Intrusion Detection System) and \\nother mitigation techniques in place. Please refer to the product secure deployment guide. \\n\\n\\n\u003cbr\u003e\u003cbr\u003e\\n\\nIt is essential for organizations to prioritize cybersecurity measures, including regular vulnerability \\nassessments and prompt application of security patches. \\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.5.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vulnerability in GE Vernova Enervista UR Setup on Windows.This issue affects Enervista: 8.6 and previous versions.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Vulnerability in GE Vernova Enervista UR Setup on Windows.\u003cp\u003eThis issue affects Enervista: 8.6 and previous versions.\u003c/p\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"2cf0fb33-79e2-44e0-beb8-826cc5ce3250\", \"shortName\": \"GE_Vernova\", \"dateUpdated\": \"2026-02-10T20:06:12.992Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2026-1763\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-10T20:29:43.312Z\", \"dateReserved\": \"2026-02-02T14:36:45.715Z\", \"assignerOrgId\": \"2cf0fb33-79e2-44e0-beb8-826cc5ce3250\", \"datePublished\": \"2026-02-10T20:06:12.992Z\", \"assignerShortName\": \"GE_Vernova\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…