Metrics
Affected Vendors & Products
No advisories yet.
Solution
The EnerVista URPC installation software versions prior to 8.70, used an incorrect method of loading the DLL (dynamic Link Library) file by referencing it relative to the location of the installation folder. If the system in which the software is installed gets compromised, an attacker could exploit this weakness and replace the legitimate DLL with a malicious file. The EnerVista UR Setup software installation has been upgraded to address this vulnerability.
Workaround
As a workaround, GE Vernova recommends having secure infrastructure in place, which can protect the system. We also recommend that customers protect their digital devices using a defense-in-depth strategy. This includes, but is not limited to, placing digital devices inside the control system network security perimeter, access controls, robust network monitoring (such as Intrusion Detection System) and other mitigation techniques in place. Please refer to the product secure deployment guide. It is essential for organizations to prioritize cybersecurity measures, including regular vulnerability assessments and prompt application of security patches.
Tue, 10 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerability in GE Vernova Enervista UR Setup on Windows.This issue affects Enervista: 8.6 and previous versions. | |
| Title | Enervista UR Setup DLL Hijacking | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GE_Vernova
Published:
Updated: 2026-02-10T20:29:43.312Z
Reserved: 2026-02-02T14:36:45.715Z
Link: CVE-2026-1763
Updated: 2026-02-10T20:29:39.156Z
Status : Awaiting Analysis
Published: 2026-02-10T20:16:53.073
Modified: 2026-02-10T21:51:48.077
Link: CVE-2026-1763
No data.
OpenCVE Enrichment
No data.
No weakness.