Search criteria
8 vulnerabilities found for rtu540_firmware by hitachienergy
CVE-2022-2081 (GCVE-0-2022-2081)
Vulnerability from nvd – Published: 2024-01-04 09:15 – Updated: 2025-05-22 18:20
VLAI?
Summary
A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function.
Severity ?
7.5 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hitachi Energy | RTU500 series CMU firmware |
Affected:
12.0.1.0 , ≤ 12.0.13.0
(custom)
Affected: 12.2.1.0 , ≤ 12.2.11.0 (custom) Affected: 12.4.1.0 , ≤ 12.4.11.0 (custom) Affected: 12.6.1.0 , ≤ 12.6.7.0 (custom) Affected: 12.7.1.0 , ≤ 12.7.3.0 (custom) Affected: 13.2.1.0 , ≤ 13.2.4.0 (custom) Affected: 13.3.1.0 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T00:24:44.276Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-2081",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-01-04T17:17:18.805708Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-22T18:20:49.318Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "RTU500 series CMU firmware",
"vendor": "Hitachi Energy",
"versions": [
{
"lessThanOrEqual": "12.0.13.0",
"status": "affected",
"version": "12.0.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "12.2.11.0",
"status": "affected",
"version": "12.2.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "12.4.11.0",
"status": "affected",
"version": "12.4.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "12.6.7.0",
"status": "affected",
"version": "12.6.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "12.7.3.0",
"status": "affected",
"version": "12.7.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "13.2.4.0",
"status": "affected",
"version": "13.2.1.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "13.3.1.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function."
}
],
"value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-24T14:31:33.084Z",
"orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"shortName": "Hitachi Energy"
},
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"assignerShortName": "Hitachi Energy",
"cveId": "CVE-2022-2081",
"datePublished": "2024-01-04T09:15:30.332Z",
"dateReserved": "2022-06-14T12:21:15.314Z",
"dateUpdated": "2025-05-22T18:20:49.318Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5769 (GCVE-0-2023-5769)
Vulnerability from nvd – Published: 2023-12-14 16:19 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the webserver that affects the
RTU500 series product versions listed below. A malicious
actor could perform cross-site scripting on the webserver
due to user input being improperly sanitized.
Severity ?
5.4 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hitachi Energy | RTU500 |
Affected:
RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11 Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11 Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9 Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6 Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6 Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:07:32.850Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "RTU500",
"vendor": "Hitachi Energy",
"versions": [
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9 "
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6 "
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3 "
}
]
}
],
"datePublic": "2023-11-28T16:19:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to user input being improperly sanitized.\n\n\n"
}
],
"value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to user input being improperly sanitized.\n\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-14T16:19:51.846Z",
"orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"shortName": "Hitachi Energy"
},
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"assignerShortName": "Hitachi Energy",
"cveId": "CVE-2023-5769",
"datePublished": "2023-12-14T16:19:51.846Z",
"dateReserved": "2023-10-25T15:24:39.863Z",
"dateUpdated": "2024-08-02T08:07:32.850Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5768 (GCVE-0-2023-5768)
Vulnerability from nvd – Published: 2023-12-04 14:33 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below.
Incomplete or wrong received APDU frame layout may
cause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer
with wrong length information of APDU or delayed reception
of data octets.
Only communication link of affected HCI IEC 60870-5-104
is blocked. If attack sequence stops the communication to
the previously attacked link gets normal again.
Severity ?
5.9 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hitachi Energy | RTU500 series |
Affected:
RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11 Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11 Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9 Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6 Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6 Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:07:32.849Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "RTU500 series",
"vendor": "Hitachi Energy",
"versions": [
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11 "
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9 "
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6 "
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3 "
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\u003cbr\u003e\u003cbr\u003eOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n"
}
],
"value": "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\n\nOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-04T14:35:49.612Z",
"orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"shortName": "Hitachi Energy"
},
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"assignerShortName": "Hitachi Energy",
"cveId": "CVE-2023-5768",
"datePublished": "2023-12-04T14:33:47.898Z",
"dateReserved": "2023-10-25T15:24:39.183Z",
"dateUpdated": "2024-08-02T08:07:32.849Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5767 (GCVE-0-2023-5767)
Vulnerability from nvd – Published: 2023-12-04 14:30 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the webserver that affects the
RTU500 series product versions listed below. A malicious
actor could perform cross-site scripting on the webserver
due to an RDT language file being improperly sanitized.
Severity ?
6 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hitachi Energy | RTU500 |
Affected:
RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11 Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11 Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9 Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6 Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6 Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:07:32.705Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "RTU500",
"vendor": "Hitachi Energy",
"versions": [
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to an RDT language file being improperly sanitized.\n\n\n"
}
],
"value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to an RDT language file being improperly sanitized.\n\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-04T14:30:24.550Z",
"orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"shortName": "Hitachi Energy"
},
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"assignerShortName": "Hitachi Energy",
"cveId": "CVE-2023-5767",
"datePublished": "2023-12-04T14:30:23.253Z",
"dateReserved": "2023-10-25T15:24:37.775Z",
"dateUpdated": "2024-08-02T08:07:32.705Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-2081 (GCVE-0-2022-2081)
Vulnerability from cvelistv5 – Published: 2024-01-04 09:15 – Updated: 2025-05-22 18:20
VLAI?
Summary
A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function.
Severity ?
7.5 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hitachi Energy | RTU500 series CMU firmware |
Affected:
12.0.1.0 , ≤ 12.0.13.0
(custom)
Affected: 12.2.1.0 , ≤ 12.2.11.0 (custom) Affected: 12.4.1.0 , ≤ 12.4.11.0 (custom) Affected: 12.6.1.0 , ≤ 12.6.7.0 (custom) Affected: 12.7.1.0 , ≤ 12.7.3.0 (custom) Affected: 13.2.1.0 , ≤ 13.2.4.0 (custom) Affected: 13.3.1.0 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T00:24:44.276Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-2081",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-01-04T17:17:18.805708Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-22T18:20:49.318Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "RTU500 series CMU firmware",
"vendor": "Hitachi Energy",
"versions": [
{
"lessThanOrEqual": "12.0.13.0",
"status": "affected",
"version": "12.0.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "12.2.11.0",
"status": "affected",
"version": "12.2.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "12.4.11.0",
"status": "affected",
"version": "12.4.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "12.6.7.0",
"status": "affected",
"version": "12.6.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "12.7.3.0",
"status": "affected",
"version": "12.7.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "13.2.4.0",
"status": "affected",
"version": "13.2.1.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "13.3.1.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function."
}
],
"value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-24T14:31:33.084Z",
"orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"shortName": "Hitachi Energy"
},
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"assignerShortName": "Hitachi Energy",
"cveId": "CVE-2022-2081",
"datePublished": "2024-01-04T09:15:30.332Z",
"dateReserved": "2022-06-14T12:21:15.314Z",
"dateUpdated": "2025-05-22T18:20:49.318Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5769 (GCVE-0-2023-5769)
Vulnerability from cvelistv5 – Published: 2023-12-14 16:19 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the webserver that affects the
RTU500 series product versions listed below. A malicious
actor could perform cross-site scripting on the webserver
due to user input being improperly sanitized.
Severity ?
5.4 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hitachi Energy | RTU500 |
Affected:
RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11 Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11 Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9 Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6 Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6 Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:07:32.850Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "RTU500",
"vendor": "Hitachi Energy",
"versions": [
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9 "
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6 "
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3 "
}
]
}
],
"datePublic": "2023-11-28T16:19:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to user input being improperly sanitized.\n\n\n"
}
],
"value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to user input being improperly sanitized.\n\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-14T16:19:51.846Z",
"orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"shortName": "Hitachi Energy"
},
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"assignerShortName": "Hitachi Energy",
"cveId": "CVE-2023-5769",
"datePublished": "2023-12-14T16:19:51.846Z",
"dateReserved": "2023-10-25T15:24:39.863Z",
"dateUpdated": "2024-08-02T08:07:32.850Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5768 (GCVE-0-2023-5768)
Vulnerability from cvelistv5 – Published: 2023-12-04 14:33 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below.
Incomplete or wrong received APDU frame layout may
cause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer
with wrong length information of APDU or delayed reception
of data octets.
Only communication link of affected HCI IEC 60870-5-104
is blocked. If attack sequence stops the communication to
the previously attacked link gets normal again.
Severity ?
5.9 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hitachi Energy | RTU500 series |
Affected:
RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11 Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11 Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9 Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6 Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6 Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:07:32.849Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "RTU500 series",
"vendor": "Hitachi Energy",
"versions": [
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11 "
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9 "
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6 "
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3 "
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\u003cbr\u003e\u003cbr\u003eOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n"
}
],
"value": "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\n\nOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-04T14:35:49.612Z",
"orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"shortName": "Hitachi Energy"
},
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"assignerShortName": "Hitachi Energy",
"cveId": "CVE-2023-5768",
"datePublished": "2023-12-04T14:33:47.898Z",
"dateReserved": "2023-10-25T15:24:39.183Z",
"dateUpdated": "2024-08-02T08:07:32.849Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5767 (GCVE-0-2023-5767)
Vulnerability from cvelistv5 – Published: 2023-12-04 14:30 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the webserver that affects the
RTU500 series product versions listed below. A malicious
actor could perform cross-site scripting on the webserver
due to an RDT language file being improperly sanitized.
Severity ?
6 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hitachi Energy | RTU500 |
Affected:
RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11 Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11 Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9 Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6 Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6 Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T08:07:32.705Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "RTU500",
"vendor": "Hitachi Energy",
"versions": [
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6"
},
{
"status": "affected",
"version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to an RDT language file being improperly sanitized.\n\n\n"
}
],
"value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to an RDT language file being improperly sanitized.\n\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-04T14:30:24.550Z",
"orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"shortName": "Hitachi Energy"
},
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"assignerShortName": "Hitachi Energy",
"cveId": "CVE-2023-5767",
"datePublished": "2023-12-04T14:30:23.253Z",
"dateReserved": "2023-10-25T15:24:37.775Z",
"dateUpdated": "2024-08-02T08:07:32.705Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}