Vulnerabilites related to hitachienergy - rtu530
Vulnerability from fkie_nvd
Published
2023-12-14 17:15
Modified
2024-11-21 08:42
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability exists in the webserver that affects the
RTU500 series product versions listed below. A malicious
actor could perform cross-site scripting on the webserver
due to user input being improperly sanitized.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E81BEA6-121C-48D7-BAA9-91D652E6BC1A", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2469A78A-6F37-4F4B-BED8-060914B2D0A4", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9E6934B-EBB2-45FB-8E4A-7D360CBA0F92", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40D7C64F-54CC-4183-8420-011E2787541F", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDD81EF6-9D45-4A2D-BFAA-D10005AEA046", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D5EFAE2-81D8-4E67-8515-137EAE453D6D", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC740F55-F482-4BC2-9D39-D27F40EBB7C9", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu520:-:*:*:*:*:*:*:*", "matchCriteriaId": "11AF93AD-200F-47A6-BA2C-F82165AFB50D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9F00BAD-06B1-49BE-BD41-61DE749E1506", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79BC5D4A-09B2-41FB-962A-CF580181EB2C", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A30CDB2F-E0CC-4440-9E59-AB339F94996F", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6BC4865-4064-421C-A746-8CB3D9DBAD7B", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5995FE68-15EA-4CB6-A43C-49582E4DF58C", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E5803D1-164F-40E2-A348-21538EE1787F", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74AE224C-8D72-4C5A-ABB7-CE447E26992C", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu530:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC6F9377-E6BB-4DEA-9D87-0AF792CBAC57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBD5E8FC-3FB5-4300-BBF4-DDAF573F20F2", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "803838B5-058E-436B-8CE5-BF711456F96B", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0361A98-1496-4763-A489-DCAE0D0DF613", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DECEA34-8A96-4943-B351-5080C4D34996", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF24A6B2-D9CF-44DE-A470-A09753D3A1B8", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B890C79-2919-48F4-9431-3B92C48089C0", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90834F09-E09B-46BE-94BC-5812E63DE98D", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu540:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EEFDEF0-883D-402B-9CD4-333A145E3C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AC22007-6E39-4C5A-A392-139B43F819C0", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BDB5A36-9B2F-43F9-A81B-506C4660151F", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F25FBFD5-BC45-49C9-87D4-A9C05405490D", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63096BB3-C0F9-4089-B11C-DE958B150DA8", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC2029C0-3710-4CBB-8CBE-9EBA5793506A", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDFF9898-F8FF-4361-A22C-DD5E47054FED", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18211DB4-DA86-4489-AFE1-48514160C1D4", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu560:-:*:*:*:*:*:*:*", "matchCriteriaId": "495DCBD6-D2D1-4295-81D1-6ACA1B2CA223", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to user input being improperly sanitized.\n\n\n" }, { "lang": "es", "value": "Existe una vulnerabilidad en el servidor web que afecta a las versiones de productos de RTU500 series que se enumeran a continuaci\u00f3n. Un actor malintencionado podr\u00eda realizar Cross-Site Scripting en el servidor web debido a que la entrada del usuario se sanitizo incorrectamente." } ], "id": "CVE-2023-5769", "lastModified": "2024-11-21T08:42:27.133", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "cybersecurity@hitachienergy.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-14T17:15:09.920", "references": [ { "source": "cybersecurity@hitachienergy.com", "tags": [ "Vendor Advisory" ], "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" } ], "sourceIdentifier": "cybersecurity@hitachienergy.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-04 15:15
Modified
2024-11-21 08:42
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below.
Incomplete or wrong received APDU frame layout may
cause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer
with wrong length information of APDU or delayed reception
of data octets.
Only communication link of affected HCI IEC 60870-5-104
is blocked. If attack sequence stops the communication to
the previously attacked link gets normal again.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E81BEA6-121C-48D7-BAA9-91D652E6BC1A", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2469A78A-6F37-4F4B-BED8-060914B2D0A4", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9E6934B-EBB2-45FB-8E4A-7D360CBA0F92", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40D7C64F-54CC-4183-8420-011E2787541F", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDD81EF6-9D45-4A2D-BFAA-D10005AEA046", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D5EFAE2-81D8-4E67-8515-137EAE453D6D", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC740F55-F482-4BC2-9D39-D27F40EBB7C9", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu520:-:*:*:*:*:*:*:*", "matchCriteriaId": "11AF93AD-200F-47A6-BA2C-F82165AFB50D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9F00BAD-06B1-49BE-BD41-61DE749E1506", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79BC5D4A-09B2-41FB-962A-CF580181EB2C", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A30CDB2F-E0CC-4440-9E59-AB339F94996F", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6BC4865-4064-421C-A746-8CB3D9DBAD7B", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5995FE68-15EA-4CB6-A43C-49582E4DF58C", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E5803D1-164F-40E2-A348-21538EE1787F", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74AE224C-8D72-4C5A-ABB7-CE447E26992C", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu530:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC6F9377-E6BB-4DEA-9D87-0AF792CBAC57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBD5E8FC-3FB5-4300-BBF4-DDAF573F20F2", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "803838B5-058E-436B-8CE5-BF711456F96B", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0361A98-1496-4763-A489-DCAE0D0DF613", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DECEA34-8A96-4943-B351-5080C4D34996", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF24A6B2-D9CF-44DE-A470-A09753D3A1B8", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B890C79-2919-48F4-9431-3B92C48089C0", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90834F09-E09B-46BE-94BC-5812E63DE98D", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu540:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EEFDEF0-883D-402B-9CD4-333A145E3C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AC22007-6E39-4C5A-A392-139B43F819C0", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BDB5A36-9B2F-43F9-A81B-506C4660151F", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F25FBFD5-BC45-49C9-87D4-A9C05405490D", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63096BB3-C0F9-4089-B11C-DE958B150DA8", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC2029C0-3710-4CBB-8CBE-9EBA5793506A", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDFF9898-F8FF-4361-A22C-DD5E47054FED", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18211DB4-DA86-4489-AFE1-48514160C1D4", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu560:-:*:*:*:*:*:*:*", "matchCriteriaId": "495DCBD6-D2D1-4295-81D1-6ACA1B2CA223", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\n\nOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n" }, { "lang": "es", "value": "Existe una vulnerabilidad en HCI IEC 60870-5-104 que afecta a las versiones de productos RTU500 series que se enumeran a continuaci\u00f3n. El dise\u00f1o de la trama APDU recibida incompleta o incorrecta puede provocar el bloqueo en la capa de enlace. La raz\u00f3n del error fue un bloqueo interminable al leer tramas entrantes en la capa de enlace con informaci\u00f3n de longitud incorrecta de APDU o recepci\u00f3n retrasada de octetos de datos. Solo se bloquea el enlace de comunicaci\u00f3n del HCI IEC 60870-5-104 afectado. Si la secuencia del ataque se detiene, la comunicaci\u00f3n con el enlace previamente atacado vuelve a ser normal." } ], "id": "CVE-2023-5768", "lastModified": "2024-11-21T08:42:27.003", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "cybersecurity@hitachienergy.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-04T15:15:07.793", "references": [ { "source": "cybersecurity@hitachienergy.com", "tags": [ "Vendor Advisory" ], "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" } ], "sourceIdentifier": "cybersecurity@hitachienergy.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-04 15:15
Modified
2024-11-21 08:42
Severity ?
6.0 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
A vulnerability exists in the webserver that affects the
RTU500 series product versions listed below. A malicious
actor could perform cross-site scripting on the webserver
due to an RDT language file being improperly sanitized.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E81BEA6-121C-48D7-BAA9-91D652E6BC1A", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2469A78A-6F37-4F4B-BED8-060914B2D0A4", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9E6934B-EBB2-45FB-8E4A-7D360CBA0F92", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40D7C64F-54CC-4183-8420-011E2787541F", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDD81EF6-9D45-4A2D-BFAA-D10005AEA046", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D5EFAE2-81D8-4E67-8515-137EAE453D6D", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC740F55-F482-4BC2-9D39-D27F40EBB7C9", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu520:-:*:*:*:*:*:*:*", "matchCriteriaId": "11AF93AD-200F-47A6-BA2C-F82165AFB50D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9F00BAD-06B1-49BE-BD41-61DE749E1506", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79BC5D4A-09B2-41FB-962A-CF580181EB2C", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A30CDB2F-E0CC-4440-9E59-AB339F94996F", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6BC4865-4064-421C-A746-8CB3D9DBAD7B", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5995FE68-15EA-4CB6-A43C-49582E4DF58C", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E5803D1-164F-40E2-A348-21538EE1787F", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "74AE224C-8D72-4C5A-ABB7-CE447E26992C", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu530:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC6F9377-E6BB-4DEA-9D87-0AF792CBAC57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBD5E8FC-3FB5-4300-BBF4-DDAF573F20F2", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "803838B5-058E-436B-8CE5-BF711456F96B", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0361A98-1496-4763-A489-DCAE0D0DF613", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DECEA34-8A96-4943-B351-5080C4D34996", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF24A6B2-D9CF-44DE-A470-A09753D3A1B8", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B890C79-2919-48F4-9431-3B92C48089C0", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90834F09-E09B-46BE-94BC-5812E63DE98D", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu540:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EEFDEF0-883D-402B-9CD4-333A145E3C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AC22007-6E39-4C5A-A392-139B43F819C0", "versionEndIncluding": "12.0.14", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BDB5A36-9B2F-43F9-A81B-506C4660151F", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F25FBFD5-BC45-49C9-87D4-A9C05405490D", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63096BB3-C0F9-4089-B11C-DE958B150DA8", "versionEndIncluding": "12.6.9", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC2029C0-3710-4CBB-8CBE-9EBA5793506A", "versionEndIncluding": "12.7.6", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDFF9898-F8FF-4361-A22C-DD5E47054FED", "versionEndIncluding": "13.2.6", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18211DB4-DA86-4489-AFE1-48514160C1D4", "versionEndIncluding": "13.4.3", "versionStartIncluding": "13.4.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu560:-:*:*:*:*:*:*:*", "matchCriteriaId": "495DCBD6-D2D1-4295-81D1-6ACA1B2CA223", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to an RDT language file being improperly sanitized.\n\n\n" }, { "lang": "es", "value": "Existe una vulnerabilidad en el servidor web que afecta a las versiones de productos RTU500 series que se enumeran a continuaci\u00f3n. Un actor malintencionado podr\u00eda realizar cross-site scripting en el servidor web debido a que un archivo de idioma RDT no se ha sanitizado incorrectamente." } ], "id": "CVE-2023-5767", "lastModified": "2024-11-21T08:42:26.870", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 4.7, "source": "cybersecurity@hitachienergy.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-04T15:15:07.613", "references": [ { "source": "cybersecurity@hitachienergy.com", "tags": [ "Vendor Advisory" ], "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" } ], "sourceIdentifier": "cybersecurity@hitachienergy.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-01-04 10:15
Modified
2024-11-21 07:00
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5E23735-DB56-4C1E-8389-B06018CC4D9E", "versionEndIncluding": "12.0.13", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2469A78A-6F37-4F4B-BED8-060914B2D0A4", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9E6934B-EBB2-45FB-8E4A-7D360CBA0F92", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8966632-8645-43D6-AB52-8BC1C1BDB6DD", "versionEndIncluding": "12.6.7", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F12F1A20-9D3C-4F2B-B538-8B4EABD288C9", "versionEndIncluding": "12.7.3", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A0F9D4-E9ED-4351-8909-EEE689DE2BF4", "versionEndIncluding": "13.2.4", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:13.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1621CAF4-C18A-48B5-82AC-F8D09105656A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu520:-:*:*:*:*:*:*:*", "matchCriteriaId": "11AF93AD-200F-47A6-BA2C-F82165AFB50D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB001482-F203-4731-A6DD-6BCE3C1338CA", "versionEndIncluding": "12.0.13", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79BC5D4A-09B2-41FB-962A-CF580181EB2C", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A30CDB2F-E0CC-4440-9E59-AB339F94996F", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "56598D9D-5BCB-42C6-8705-AB79C4BD2A9A", "versionEndIncluding": "12.6.7", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4FDE92C-733F-4B52-8BE6-E37898B39075", "versionEndIncluding": "12.7.3", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2209D1D9-94CD-4D8B-BB80-39CC129FEEF4", "versionEndIncluding": "13.2.4", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:13.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BACEC63E-0548-483F-813E-C04F4C95970E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu530:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC6F9377-E6BB-4DEA-9D87-0AF792CBAC57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F1F7579-050B-4216-A4D5-FD74C8A19618", "versionEndIncluding": "12.0.13", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "803838B5-058E-436B-8CE5-BF711456F96B", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0361A98-1496-4763-A489-DCAE0D0DF613", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "762AB8CE-068D-46D4-A275-154A2AC58E55", "versionEndIncluding": "12.6.7", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DF9263A-D1DB-4899-99C2-88B59847C808", "versionEndIncluding": "12.7.3", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15B3C46C-0A5E-4142-A096-94A513DD8004", "versionEndIncluding": "13.2.4", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:13.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E8B2A709-9538-47C9-9E70-DBC1D2817E79", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu540:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EEFDEF0-883D-402B-9CD4-333A145E3C75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0708BD2D-FEA4-4C97-9C3A-B4E67EA3D926", "versionEndIncluding": "12.0.13", "versionStartIncluding": "12.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BDB5A36-9B2F-43F9-A81B-506C4660151F", "versionEndIncluding": "12.2.11", "versionStartIncluding": "12.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F25FBFD5-BC45-49C9-87D4-A9C05405490D", "versionEndIncluding": "12.4.11", "versionStartIncluding": "12.4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0505DF4D-0B06-4E61-B756-C2B5D31B85A0", "versionEndIncluding": "12.6.7", "versionStartIncluding": "12.6.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9495E9A9-733C-4073-8B39-1A08A88B05A7", "versionEndIncluding": "12.7.3", "versionStartIncluding": "12.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "269F1D56-A575-487D-B5ED-4E774C26BA3B", "versionEndIncluding": "13.2.4", "versionStartIncluding": "13.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:13.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "530437F6-6F90-45D5-821C-B87C292C0CCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hitachienergy:rtu560:-:*:*:*:*:*:*:*", "matchCriteriaId": "495DCBD6-D2D1-4295-81D1-6ACA1B2CA223", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function." }, { "lang": "es", "value": "Existe una vulnerabilidad en la funci\u00f3n HCI Modbus TCP incluida en las versiones de producto enumeradas anteriormente. Si HCI Modbus TCP est\u00e1 habilitado y configurado, un atacante podr\u00eda aprovechar la vulnerabilidad enviando un mensaje especialmente manipulado a la RTU500 a alta velocidad, lo que provocar\u00eda que la CMU RTU500 objetivo se reiniciara. La vulnerabilidad se debe a una falta de control de inundaciones que eventualmente, si se explota, provoca un desbordamiento de pila interna en la funci\u00f3n HCI Modbus TCP." } ], "id": "CVE-2022-2081", "lastModified": "2024-11-21T07:00:17.247", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "cybersecurity@hitachienergy.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-01-04T10:15:10.927", "references": [ { "source": "cybersecurity@hitachienergy.com", "tags": [ "Vendor Advisory" ], "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "sourceIdentifier": "cybersecurity@hitachienergy.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "cybersecurity@hitachienergy.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2023-5768 (GCVE-0-2023-5768)
Vulnerability from cvelistv5
Published
2023-12-04 14:33
Modified
2024-08-02 08:07
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below.
Incomplete or wrong received APDU frame layout may
cause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer
with wrong length information of APDU or delayed reception
of data octets.
Only communication link of affected HCI IEC 60870-5-104
is blocked. If attack sequence stops the communication to
the previously attacked link gets normal again.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hitachi Energy | RTU500 series |
Version: RTU500 series CMU Firmware version 12.0.1 – 12.0.14 Version: RTU500 series CMU Firmware version 12.2.1 – 12.2.11 Version: RTU500 series CMU Firmware version 12.4.1 – 12.4.11 Version: RTU500 series CMU Firmware version 12.6.1 – 12.6.9 Version: RTU500 series CMU Firmware version 12.7.1 – 12.7.6 Version: RTU500 series CMU Firmware version 13.2.1 – 13.2.6 Version: RTU500 series CMU Firmware version 13.4.1 – 13.4.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:07:32.849Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RTU500 series", "vendor": "Hitachi Energy", "versions": [ { "status": "affected", "version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11 " }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9 " }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6 " }, { "status": "affected", "version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3 " } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\u003cbr\u003e\u003cbr\u003eOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n" } ], "value": "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\n\nOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-04T14:35:49.612Z", "orgId": "e383dce4-0c27-4495-91c4-0db157728d17", "shortName": "Hitachi Energy" }, "references": [ { "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17", "assignerShortName": "Hitachi Energy", "cveId": "CVE-2023-5768", "datePublished": "2023-12-04T14:33:47.898Z", "dateReserved": "2023-10-25T15:24:39.183Z", "dateUpdated": "2024-08-02T08:07:32.849Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-5767 (GCVE-0-2023-5767)
Vulnerability from cvelistv5
Published
2023-12-04 14:30
Modified
2024-08-02 08:07
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability exists in the webserver that affects the
RTU500 series product versions listed below. A malicious
actor could perform cross-site scripting on the webserver
due to an RDT language file being improperly sanitized.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hitachi Energy | RTU500 |
Version: RTU500 series CMU Firmware version 12.0.1 – 12.0.14 Version: RTU500 series CMU Firmware version 12.2.1 – 12.2.11 Version: RTU500 series CMU Firmware version 12.4.1 – 12.4.11 Version: RTU500 series CMU Firmware version 12.6.1 – 12.6.9 Version: RTU500 series CMU Firmware version 12.7.1 – 12.7.6 Version: RTU500 series CMU Firmware version 13.2.1 – 13.2.6 Version: RTU500 series CMU Firmware version 13.4.1 – 13.4.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:07:32.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RTU500", "vendor": "Hitachi Energy", "versions": [ { "status": "affected", "version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to an RDT language file being improperly sanitized.\n\n\n" } ], "value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to an RDT language file being improperly sanitized.\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-04T14:30:24.550Z", "orgId": "e383dce4-0c27-4495-91c4-0db157728d17", "shortName": "Hitachi Energy" }, "references": [ { "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17", "assignerShortName": "Hitachi Energy", "cveId": "CVE-2023-5767", "datePublished": "2023-12-04T14:30:23.253Z", "dateReserved": "2023-10-25T15:24:37.775Z", "dateUpdated": "2024-08-02T08:07:32.705Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-5769 (GCVE-0-2023-5769)
Vulnerability from cvelistv5
Published
2023-12-14 16:19
Modified
2024-08-02 08:07
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability exists in the webserver that affects the
RTU500 series product versions listed below. A malicious
actor could perform cross-site scripting on the webserver
due to user input being improperly sanitized.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hitachi Energy | RTU500 |
Version: RTU500 series CMU Firmware version 12.0.1 – 12.0.14 Version: RTU500 series CMU Firmware version 12.2.1 – 12.2.11 Version: RTU500 series CMU Firmware version 12.4.1 – 12.4.11 Version: RTU500 series CMU Firmware version 12.6.1 – 12.6.9 Version: RTU500 series CMU Firmware version 12.7.1 – 12.7.6 Version: RTU500 series CMU Firmware version 13.2.1 – 13.2.6 Version: RTU500 series CMU Firmware version 13.4.1 – 13.4.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:07:32.850Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RTU500", "vendor": "Hitachi Energy", "versions": [ { "status": "affected", "version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9 " }, { "status": "affected", "version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6" }, { "status": "affected", "version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6 " }, { "status": "affected", "version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3 " } ] } ], "datePublic": "2023-11-28T16:19:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to user input being improperly sanitized.\n\n\n" } ], "value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to user input being improperly sanitized.\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-14T16:19:51.846Z", "orgId": "e383dce4-0c27-4495-91c4-0db157728d17", "shortName": "Hitachi Energy" }, "references": [ { "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17", "assignerShortName": "Hitachi Energy", "cveId": "CVE-2023-5769", "datePublished": "2023-12-14T16:19:51.846Z", "dateReserved": "2023-10-25T15:24:39.863Z", "dateUpdated": "2024-08-02T08:07:32.850Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-2081 (GCVE-0-2022-2081)
Vulnerability from cvelistv5
Published
2024-01-04 09:15
Modified
2025-05-22 18:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hitachi Energy | RTU500 series CMU firmware |
Version: 12.0.1.0 < Version: 12.2.1.0 < Version: 12.4.1.0 < Version: 12.6.1.0 < Version: 12.7.1.0 < Version: 13.2.1.0 < Version: 13.3.1.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:24:44.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-2081", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-04T17:17:18.805708Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-22T18:20:49.318Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "RTU500 series CMU firmware", "vendor": "Hitachi Energy", "versions": [ { "lessThanOrEqual": "12.0.13.0", "status": "affected", "version": "12.0.1.0", "versionType": "custom" }, { "lessThanOrEqual": "12.2.11.0", "status": "affected", "version": "12.2.1.0", "versionType": "custom" }, { "lessThanOrEqual": "12.4.11.0", "status": "affected", "version": "12.4.1.0", "versionType": "custom" }, { "lessThanOrEqual": "12.6.7.0", "status": "affected", "version": "12.6.1.0", "versionType": "custom" }, { "lessThanOrEqual": "12.7.3.0", "status": "affected", "version": "12.7.1.0", "versionType": "custom" }, { "lessThanOrEqual": "13.2.4.0", "status": "affected", "version": "13.2.1.0", "versionType": "custom" }, { "status": "affected", "version": "13.3.1.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function." } ], "value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T14:31:33.084Z", "orgId": "e383dce4-0c27-4495-91c4-0db157728d17", "shortName": "Hitachi Energy" }, "references": [ { "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17", "assignerShortName": "Hitachi Energy", "cveId": "CVE-2022-2081", "datePublished": "2024-01-04T09:15:30.332Z", "dateReserved": "2022-06-14T12:21:15.314Z", "dateUpdated": "2025-05-22T18:20:49.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }