Vulnerability Description
GE Mark VIe Controller is shipped with pre-configured hard-coded credentials that may allow root-user access to the controller. A limited application of the affected product may ship without setup and configuration instructions immediately available to the end user. The bulk of controllers go into applications requiring the GE commissioning engineer to change default configurations during the installation process. GE recommends that users reset controller passwords during installation in the operating environment.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ge | Mark Vie Controll System | - |
Related Weaknesses (CWE)
References
- https://www.us-cert.gov/ics/advisories/icsa-19-281-02Third Party AdvisoryUS Government Resource
- https://www.us-cert.gov/ics/advisories/icsa-19-281-02Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2019-13559?
CVE-2019-13559 is a vulnerability with a CVSS score of 7.8 (HIGH). GE Mark VIe Controller is shipped with pre-configured hard-coded credentials that may allow root-user access to the controller. A limited application of the affected product may ship without setup and...
How severe is CVE-2019-13559?
CVE-2019-13559 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-13559?
Check the references section above for vendor advisories and patch information. Affected products include: Ge Mark Vie Controll System.