Vulnerability Description
Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to allow unauthenticated users to launch applications and support remote code execution through web services.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ge | Mds Pulsenet | <= 3.2.1 |
Related Weaknesses (CWE)
References
- http://www.gegridsolutions.com/app/DownloadFile.aspx?prod=pulsenet&type=9&file=1Permissions Required
- http://www.securityfocus.com/bid/104377Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-18-151-02Third Party AdvisoryUS Government Resource
- http://www.gegridsolutions.com/app/DownloadFile.aspx?prod=pulsenet&type=9&file=1Permissions Required
- http://www.securityfocus.com/bid/104377Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-18-151-02Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2018-10611?
CVE-2018-10611 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to allow unauthenticated users to launch applications and support...
How severe is CVE-2018-10611?
CVE-2018-10611 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-10611?
Check the references section above for vendor advisories and patch information. Affected products include: Ge Mds Pulsenet.