FKIE_CVE-2025-27253

Vulnerability from fkie_nvd - Published: 2025-03-10 09:15 - Updated: 2025-10-07 15:16
Summary
A CWE-15 "External Control of System or Configuration Setting" in GE Vernova UR IED family devices from version 7.0 up to 8.60 allows an attacker to provide input that establishes a TCP connection through a port forwarding. The lack of the IP address and port validation may allow the attacker to bypass firewall rules or to send malicious traffic in the network.
Impacted products
Vendor Product Version

{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A\u00a0CWE-15 \"External Control of System or Configuration Setting\"\u00a0in GE Vernova UR IED family devices from version 7.0 up to 8.60 allows an attacker to provide input that establishes a TCP connection through a port forwarding. The lack of the IP address and port validation may allow the attacker to bypass firewall rules or to send malicious traffic in the network."
    },
    {
      "lang": "es",
      "value": "Una validaci\u00f3n de entrada incorrecta en los dispositivos de la familia GE Vernova UR IED de la versi\u00f3n 7.0 a la 8.60 permite a un atacante proporcionar una entrada que establezca una conexi\u00f3n TCP a trav\u00e9s de un reenv\u00edo de puerto. La falta de validaci\u00f3n de la direcci\u00f3n IP y del puerto puede permitir al atacante eludir las reglas del firewall o enviar tr\u00e1fico malicioso en la red."
    }
  ],
  "id": "CVE-2025-27253",
  "lastModified": "2025-10-07T15:16:02.243",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "prodsec@nozominetworks.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-03-10T09:15:10.897",
  "references": [
    {
      "source": "prodsec@nozominetworks.com",
      "url": "https://www.gevernova.com/grid-solutions/app/DownloadFile.aspx?prod=urfamily\u0026type=21\u0026file=76"
    },
    {
      "source": "prodsec@nozominetworks.com",
      "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-27253"
    }
  ],
  "sourceIdentifier": "prodsec@nozominetworks.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-15"
        }
      ],
      "source": "prodsec@nozominetworks.com",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…