CVE-2021-27422

7.5 HIGH

📋 TL;DR

GE UR firmware versions prior to 8.1x expose sensitive information through the web server interface without requiring authentication. This vulnerability affects GE UR series protective relays with unpatched firmware, allowing attackers to access confidential data.

💻 Affected Systems

Products:
  • GE UR Series Protective Relays
Versions: All versions prior to 8.1x
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with HTTP web interface enabled (default configuration).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain sensitive configuration data, operational parameters, or credentials that could facilitate further attacks on critical infrastructure systems.

🟠

Likely Case

Unauthenticated access to device information, potentially revealing network configurations and system details that could aid reconnaissance for more targeted attacks.

🟢

If Mitigated

With proper network segmentation and access controls, exposure is limited to authorized personnel only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the device's web interface but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.1x and later

Vendor Advisory: https://www.gegridsolutions.com/Passport/Login.aspx

Restart Required: Yes

Instructions:

1. Download firmware version 8.1x or later from GE Grid Solutions portal. 2. Follow GE's firmware update procedures for UR series devices. 3. Verify successful update and restart device.

🔧 Temporary Workarounds

Disable HTTP Web Interface

all

Disable the HTTP web server interface if not required for operations.

Consult GE UR device configuration manual for web interface disable procedures

Network Segmentation

all

Isolate UR devices in protected network segments with strict access controls.

Implement firewall rules to restrict access to UR device IP addresses

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to UR devices
  • Monitor network traffic to UR devices for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device web interface or configuration software. If version is below 8.1x, device is vulnerable.

Check Version:

Check via UR device web interface or using GE EnerVista software

Verify Fix Applied:

Confirm firmware version is 8.1x or later and test that unauthenticated access to sensitive information is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to UR device web interface
  • Multiple failed authentication attempts followed by successful information retrieval

Network Indicators:

  • HTTP requests to UR device web interface without authentication headers
  • Unusual information gathering patterns from UR device IP addresses

SIEM Query:

source_ip=* AND dest_ip=UR_DEVICE_IP AND http_method=GET AND NOT http_user_agent=* AND response_code=200

🔗 References

📤 Share & Export