Vulnerability in GE Vernova Enervista UR Setup on Windows.This issue affects Enervista: 8.6 and previous versions.
Advisories

No advisories yet.

Fixes

Solution

The EnerVista URPC installation software versions prior to 8.70, used an incorrect method of loading the DLL (dynamic Link Library) file by referencing it relative to the location of the installation folder. If the system in which the software is installed gets compromised, an attacker could exploit this weakness and replace the legitimate DLL with a malicious file. The EnerVista UR Setup software installation has been upgraded to address this vulnerability.


Workaround

As a workaround, GE Vernova recommends having secure infrastructure in place, which can protect the system. We also recommend that customers protect their digital devices using a defense-in-depth strategy. This includes, but is not limited to, placing digital devices inside the control system network security perimeter, access controls, robust network monitoring (such as Intrusion Detection System) and other mitigation techniques in place. Please refer to the product secure deployment guide. It is essential for organizations to prioritize cybersecurity measures, including regular vulnerability assessments and prompt application of security patches.

History

Tue, 10 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Description Vulnerability in GE Vernova Enervista UR Setup on Windows.This issue affects Enervista: 8.6 and previous versions.
Title Enervista UR Setup DLL Hijacking
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GE_Vernova

Published:

Updated: 2026-02-10T20:29:43.312Z

Reserved: 2026-02-02T14:36:45.715Z

Link: CVE-2026-1763

cve-icon Vulnrichment

Updated: 2026-02-10T20:29:39.156Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-10T20:16:53.073

Modified: 2026-02-10T21:51:48.077

Link: CVE-2026-1763

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses

No weakness.