Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-1763
PUBLISHED
More InfoOfficial Page
Assigner-GE_Vernova
Assigner Org ID-2cf0fb33-79e2-44e0-beb8-826cc5ce3250
View Known Exploited Vulnerability (KEV) details
Published At-10 Feb, 2026 | 20:06
Updated At-27 Feb, 2026 | 14:54
Rejected At-
▼CVE Numbering Authority (CNA)
Enervista UR Setup DLL Hijacking

Vulnerability in GE Vernova Enervista UR Setup on Windows.This issue affects Enervista: 8.6 and previous versions.

Affected Products
Vendor
GE Vernova
Product
Enervista
Package Name
UR Setup
Platforms
  • Windows
Default Status
unaffected
Versions
Affected
  • 8.6 and previous versions
Metrics
VersionBase scoreBase severityVector
3.14.6MEDIUM
CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N
Version: 3.1
Base score: 4.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

The EnerVista URPC installation software versions prior to 8.70, used an incorrect method of loading the DLL (dynamic Link Library) file by referencing it relative to the location of the installation folder. If the system in which the software is installed gets compromised, an attacker could exploit this weakness and replace the legitimate DLL with a malicious file. The EnerVista UR Setup software installation has been upgraded to address this vulnerability.

Configurations

Workarounds

As a workaround, GE Vernova recommends having secure infrastructure in place, which can protect the system. We also recommend that customers protect their digital devices using a defense-in-depth strategy. This includes, but is not limited to, placing digital devices inside the control system network security perimeter, access controls, robust network monitoring (such as Intrusion Detection System) and other mitigation techniques in place. Please refer to the product secure deployment guide. It is essential for organizations to prioritize cybersecurity measures, including regular vulnerability assessments and prompt application of security patches.

Exploits

Credits

finder
Reid Wightman
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.gevernova.com/grid-solutions/passport/login?destination=resources%3Fprod%3Durfamily%26type%3D21%26node_id%3D4987%26check_logged_in%3D1
N/A
Hyperlink: https://www.gevernova.com/grid-solutions/passport/login?destination=resources%3Fprod%3Durfamily%26type%3D21%26node_id%3D4987%26check_logged_in%3D1
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-35CWE-35 Path Traversal: '.../...//'
Type: CWE
CWE ID: CWE-35
Description: CWE-35 Path Traversal: '.../...//'
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/news-events/ics-advisories/icsa-26-048-03
government-resource
Hyperlink: https://www.cisa.gov/news-events/ics-advisories/icsa-26-048-03
Resource:
government-resource
Details not found