Browse all 32 CVE security advisories affecting GE. AI-powered Chinese analysis, POCs, and references for each vulnerability.
General Electric operates across diverse sectors, including aviation, healthcare, and power generation, with its industrial Internet of Things (IoT) platforms forming a critical infrastructure component. Historically, vulnerabilities within GE’s software ecosystems have frequently involved remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from legacy industrial control systems or web-facing management interfaces. Notable incidents include the 2018 ransomware attack on GE Healthcare, which disrupted MRI and CT scanner operations across multiple hospitals, highlighting the tangible risks of connected medical devices. The current record of 32 Common Vulnerabilities and Exposures underscores persistent challenges in securing heterogeneous hardware and software stacks. These issues typically arise from outdated dependencies, insufficient input validation, and complex network architectures that complicate patch management. Consequently, GE faces ongoing scrutiny regarding its incident response capabilities and the resilience of its critical operational technology against evolving cyber threats.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2021-27430 | GE UR family hardcoded credentials — UR bootloader binaryCWE-798 | 8.4 | High | 2022-03-23 |
This page lists every published CVE security advisory associated with GE. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.