A serious vulnerability found in one of GE’s Bently Nevada condition and vibration monitoring products can be exploited by remote attackers to gain unauthorized access to affected devices, ICS-CERT warned on Thursday.
The vulnerability, tracked as CVE-2016-5788 and assigned a CVSS v3 score of 10, affects the serial and USB versions of GE Bently Nevada 3500/22M, a machine monitoring system used around the world in the energy and chemical sectors.
The security hole is caused by the existence of several open ports on the affected device. The open ports allow a remote attacker to gain unauthorized access to the system with elevated privileges.
While there is no evidence that the vulnerability has been exploited for malicious purposes, ICS-CERT warned that even an attacker with low skill can exploit it.
GE has addressed the vulnerability in the USB variant of Bently Nevada 3500/22M with the release of firmware version 5.0, but the issue remains unpatched in the serial variant of the product.
The vendor has advised concerned users to segment networks and implement demilitarized zones (DMZs), leverage system hardening techniques described in the affected product’s documentation, and implement bump-in-the-wire solutions to secure communications.
This is the second time ICS-CERT has warned GE customers this year of a critical vulnerability in one of the company’s products. In early June, the agency released an advisory describing a major security hole in GE’s MultiLink managed ethernet switches.
Users were informed at the time that several ML switches had hardcoded credentials that allowed remote attackers to gain administrator access to the web-based interface.
A less severe issue was disclosed in July, when ICS-CERT warned of a flaw that could allow a local hacker to edit the configuration of the Proficy HMI/SCADA–CIMPLICITY service.
Related: Learn More At SecurityWeek’s 2016 ICS Cyber Security Conference
Related: GE Brings Predix Industrial Platform to Microsoft Cloud

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
Latest News
- Sentra Raises $30 Million for DSPM Technology
- Cyber Insights 2023: Cyberinsurance
- Cyber Insights 2023: Attack Surface Management
- Cyber Insights 2023: Artificial Intelligence
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- How the Atomized Network Changed Enterprise Protection
- Critical QNAP Vulnerability Leads to Code Injection
