Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

12 vulnerabilities found for rtu560_firmware by hitachienergy

CVE-2026-1773 (GCVE-0-2026-1773)

Vulnerability from nvd – Published: 2026-02-24 13:13 – Updated: 2026-02-28 02:20
VLAI?
Summary
IEC 60870-5-104: Potential Denial of Service impact on reception of invalid U-format frame. Product is only affected if IEC 60870-5-104 bi-directional functionality is configured. Enabling secure communication following IEC 62351-3 does not remediate the vulnerability but mitigates the risk of exploitation.
CWE
  • CWE-184 - Incomplete List of Disallowed Inputs
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 series CMU firmware Affected: 12.7.1 , ≤ 12.7.7 (custom)
Affected: 13.5.1 , ≤ 13.5.4 (custom)
Affected: 13.6.1 , ≤ 13.6.2 (custom)
Affected: 13.7.1 , ≤ 13.7.7 (custom)
Affected: 13.8.1 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-1773",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-28T02:19:44.432868Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-28T02:20:00.192Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500 series CMU firmware",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "lessThanOrEqual": "12.7.7",
              "status": "affected",
              "version": "12.7.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.5.4",
              "status": "affected",
              "version": "13.5.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.6.2",
              "status": "affected",
              "version": "13.6.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.7.7",
              "status": "affected",
              "version": "13.7.1",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "13.8.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "IEC 60870-5-104: Potential Denial of Service impact on reception of invalid U-format frame.\u0026nbsp;Product is only affected if IEC 60870-5-104 bi-directional functionality is configured. Enabling secure communication following IEC 62351-3 does not remediate the vulnerability but mitigates the risk of exploitation.\u003cbr\u003e"
            }
          ],
          "value": "IEC 60870-5-104: Potential Denial of Service impact on reception of invalid U-format frame.\u00a0Product is only affected if IEC 60870-5-104 bi-directional functionality is configured. Enabling secure communication following IEC 62351-3 does not remediate the vulnerability but mitigates the risk of exploitation."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-278",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-278 Web Services Protocol Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-184",
              "description": "CWE-184 Incomplete List of Disallowed Inputs",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-24T13:40:55.104Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000237\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2026-1773",
    "datePublished": "2026-02-24T13:13:17.990Z",
    "dateReserved": "2026-02-02T16:28:59.394Z",
    "dateUpdated": "2026-02-28T02:20:00.192Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-1772 (GCVE-0-2026-1772)

Vulnerability from nvd – Published: 2026-02-24 13:03 – Updated: 2026-02-28 02:19
VLAI?
Summary
RTU500 web interface: An unprivileged user can read user management information. The information cannot be accessed via the RTU500 web user interface but requires further tools like browser development utilities to access them without required privileges.
CWE
  • CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 series CMU firmware Affected: 12.7.1 , ≤ 12.7.7 (custom)
Affected: 13.5.1 , ≤ 13.5.4 (custom)
Affected: 13.6.1 , ≤ 13.6.2 (custom)
Affected: 13.7.1 , ≤ 13.7.7 (custom)
Affected: 13.8.1 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-1772",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-28T02:18:35.605096Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-28T02:19:01.092Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500 series CMU firmware",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "lessThanOrEqual": "12.7.7",
              "status": "affected",
              "version": "12.7.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.5.4",
              "status": "affected",
              "version": "13.5.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.6.2",
              "status": "affected",
              "version": "13.6.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.7.7",
              "status": "affected",
              "version": "13.7.1",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "13.8.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "RTU500 web interface: An unprivileged user can read user management information. The information cannot be accessed via the RTU500 web user interface but requires further tools like browser development utilities to access them without required privileges.\u003cbr\u003e"
            }
          ],
          "value": "RTU500 web interface: An unprivileged user can read user management information. The information cannot be accessed via the RTU500 web user interface but requires further tools like browser development utilities to access them without required privileges."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-503",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-503 WebView Exposure"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-280",
              "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-24T13:38:30.521Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000237\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2026-1772",
    "datePublished": "2026-02-24T13:03:23.592Z",
    "dateReserved": "2026-02-02T16:28:53.742Z",
    "dateUpdated": "2026-02-28T02:19:01.092Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2022-2081 (GCVE-0-2022-2081)

Vulnerability from nvd – Published: 2024-01-04 09:15 – Updated: 2025-05-22 18:20
VLAI?
Summary
A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function.
CWE
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 series CMU firmware Affected: 12.0.1.0 , ≤ 12.0.13.0 (custom)
Affected: 12.2.1.0 , ≤ 12.2.11.0 (custom)
Affected: 12.4.1.0 , ≤ 12.4.11.0 (custom)
Affected: 12.6.1.0 , ≤ 12.6.7.0 (custom)
Affected: 12.7.1.0 , ≤ 12.7.3.0 (custom)
Affected: 13.2.1.0 , ≤ 13.2.4.0 (custom)
Affected: 13.3.1.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T00:24:44.276Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-2081",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-04T17:17:18.805708Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-22T18:20:49.318Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500 series CMU firmware",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "lessThanOrEqual": "12.0.13.0",
              "status": "affected",
              "version": "12.0.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "12.2.11.0",
              "status": "affected",
              "version": "12.2.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "12.4.11.0",
              "status": "affected",
              "version": "12.4.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "12.6.7.0",
              "status": "affected",
              "version": "12.6.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "12.7.3.0",
              "status": "affected",
              "version": "12.7.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.2.4.0",
              "status": "affected",
              "version": "13.2.1.0",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "13.3.1.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function."
            }
          ],
          "value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-24T14:31:33.084Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2022-2081",
    "datePublished": "2024-01-04T09:15:30.332Z",
    "dateReserved": "2022-06-14T12:21:15.314Z",
    "dateUpdated": "2025-05-22T18:20:49.318Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5769 (GCVE-0-2023-5769)

Vulnerability from nvd – Published: 2023-12-14 16:19 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the webserver that affects the RTU500 series product versions listed below. A malicious actor could perform cross-site scripting on the webserver due to user input being improperly sanitized.
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 Affected: RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11
Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11
Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9
Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6
Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6
Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3
Create a notification for this product.
Date Public ?
2023-11-28 16:19
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:07:32.850Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9 "
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6 "
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3 "
            }
          ]
        }
      ],
      "datePublic": "2023-11-28T16:19:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to user input being improperly sanitized.\n\n\n"
            }
          ],
          "value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to user input being improperly sanitized.\n\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-14T16:19:51.846Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2023-5769",
    "datePublished": "2023-12-14T16:19:51.846Z",
    "dateReserved": "2023-10-25T15:24:39.863Z",
    "dateUpdated": "2024-08-02T08:07:32.850Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5768 (GCVE-0-2023-5768)

Vulnerability from nvd – Published: 2023-12-04 14:33 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. Incomplete or wrong received APDU frame layout may cause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer with wrong length information of APDU or delayed reception of data octets. Only communication link of affected HCI IEC 60870-5-104 is blocked. If attack sequence stops the communication to the previously attacked link gets normal again.
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 series Affected: RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11
Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11
Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9
Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6
Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6
Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:07:32.849Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500 series",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11 "
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9 "
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6 "
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3 "
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\u003cbr\u003e\u003cbr\u003eOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n"
            }
          ],
          "value": "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\n\nOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T14:35:49.612Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2023-5768",
    "datePublished": "2023-12-04T14:33:47.898Z",
    "dateReserved": "2023-10-25T15:24:39.183Z",
    "dateUpdated": "2024-08-02T08:07:32.849Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5767 (GCVE-0-2023-5767)

Vulnerability from nvd – Published: 2023-12-04 14:30 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the webserver that affects the RTU500 series product versions listed below. A malicious actor could perform cross-site scripting on the webserver due to an RDT language file being improperly sanitized.
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 Affected: RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11
Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11
Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9
Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6
Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6
Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:07:32.705Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to an RDT language file being improperly sanitized.\n\n\n"
            }
          ],
          "value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to an RDT language file being improperly sanitized.\n\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T14:30:24.550Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2023-5767",
    "datePublished": "2023-12-04T14:30:23.253Z",
    "dateReserved": "2023-10-25T15:24:37.775Z",
    "dateUpdated": "2024-08-02T08:07:32.705Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2026-1773 (GCVE-0-2026-1773)

Vulnerability from cvelistv5 – Published: 2026-02-24 13:13 – Updated: 2026-02-28 02:20
VLAI?
Summary
IEC 60870-5-104: Potential Denial of Service impact on reception of invalid U-format frame. Product is only affected if IEC 60870-5-104 bi-directional functionality is configured. Enabling secure communication following IEC 62351-3 does not remediate the vulnerability but mitigates the risk of exploitation.
CWE
  • CWE-184 - Incomplete List of Disallowed Inputs
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 series CMU firmware Affected: 12.7.1 , ≤ 12.7.7 (custom)
Affected: 13.5.1 , ≤ 13.5.4 (custom)
Affected: 13.6.1 , ≤ 13.6.2 (custom)
Affected: 13.7.1 , ≤ 13.7.7 (custom)
Affected: 13.8.1 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-1773",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-28T02:19:44.432868Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-28T02:20:00.192Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500 series CMU firmware",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "lessThanOrEqual": "12.7.7",
              "status": "affected",
              "version": "12.7.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.5.4",
              "status": "affected",
              "version": "13.5.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.6.2",
              "status": "affected",
              "version": "13.6.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.7.7",
              "status": "affected",
              "version": "13.7.1",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "13.8.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "IEC 60870-5-104: Potential Denial of Service impact on reception of invalid U-format frame.\u0026nbsp;Product is only affected if IEC 60870-5-104 bi-directional functionality is configured. Enabling secure communication following IEC 62351-3 does not remediate the vulnerability but mitigates the risk of exploitation.\u003cbr\u003e"
            }
          ],
          "value": "IEC 60870-5-104: Potential Denial of Service impact on reception of invalid U-format frame.\u00a0Product is only affected if IEC 60870-5-104 bi-directional functionality is configured. Enabling secure communication following IEC 62351-3 does not remediate the vulnerability but mitigates the risk of exploitation."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-278",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-278 Web Services Protocol Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-184",
              "description": "CWE-184 Incomplete List of Disallowed Inputs",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-24T13:40:55.104Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000237\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2026-1773",
    "datePublished": "2026-02-24T13:13:17.990Z",
    "dateReserved": "2026-02-02T16:28:59.394Z",
    "dateUpdated": "2026-02-28T02:20:00.192Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-1772 (GCVE-0-2026-1772)

Vulnerability from cvelistv5 – Published: 2026-02-24 13:03 – Updated: 2026-02-28 02:19
VLAI?
Summary
RTU500 web interface: An unprivileged user can read user management information. The information cannot be accessed via the RTU500 web user interface but requires further tools like browser development utilities to access them without required privileges.
CWE
  • CWE-280 - Improper Handling of Insufficient Permissions or Privileges
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 series CMU firmware Affected: 12.7.1 , ≤ 12.7.7 (custom)
Affected: 13.5.1 , ≤ 13.5.4 (custom)
Affected: 13.6.1 , ≤ 13.6.2 (custom)
Affected: 13.7.1 , ≤ 13.7.7 (custom)
Affected: 13.8.1 (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-1772",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-28T02:18:35.605096Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-28T02:19:01.092Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500 series CMU firmware",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "lessThanOrEqual": "12.7.7",
              "status": "affected",
              "version": "12.7.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.5.4",
              "status": "affected",
              "version": "13.5.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.6.2",
              "status": "affected",
              "version": "13.6.1",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.7.7",
              "status": "affected",
              "version": "13.7.1",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "13.8.1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "RTU500 web interface: An unprivileged user can read user management information. The information cannot be accessed via the RTU500 web user interface but requires further tools like browser development utilities to access them without required privileges.\u003cbr\u003e"
            }
          ],
          "value": "RTU500 web interface: An unprivileged user can read user management information. The information cannot be accessed via the RTU500 web user interface but requires further tools like browser development utilities to access them without required privileges."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-503",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-503 WebView Exposure"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-280",
              "description": "CWE-280 Improper Handling of Insufficient Permissions or Privileges",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-24T13:38:30.521Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000237\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2026-1772",
    "datePublished": "2026-02-24T13:03:23.592Z",
    "dateReserved": "2026-02-02T16:28:53.742Z",
    "dateUpdated": "2026-02-28T02:19:01.092Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2022-2081 (GCVE-0-2022-2081)

Vulnerability from cvelistv5 – Published: 2024-01-04 09:15 – Updated: 2025-05-22 18:20
VLAI?
Summary
A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function.
CWE
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 series CMU firmware Affected: 12.0.1.0 , ≤ 12.0.13.0 (custom)
Affected: 12.2.1.0 , ≤ 12.2.11.0 (custom)
Affected: 12.4.1.0 , ≤ 12.4.11.0 (custom)
Affected: 12.6.1.0 , ≤ 12.6.7.0 (custom)
Affected: 12.7.1.0 , ≤ 12.7.3.0 (custom)
Affected: 13.2.1.0 , ≤ 13.2.4.0 (custom)
Affected: 13.3.1.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T00:24:44.276Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-2081",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-04T17:17:18.805708Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-22T18:20:49.318Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500 series CMU firmware",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "lessThanOrEqual": "12.0.13.0",
              "status": "affected",
              "version": "12.0.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "12.2.11.0",
              "status": "affected",
              "version": "12.2.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "12.4.11.0",
              "status": "affected",
              "version": "12.4.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "12.6.7.0",
              "status": "affected",
              "version": "12.6.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "12.7.3.0",
              "status": "affected",
              "version": "12.7.1.0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "13.2.4.0",
              "status": "affected",
              "version": "13.2.1.0",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "13.3.1.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function."
            }
          ],
          "value": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-24T14:31:33.084Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2022-2081",
    "datePublished": "2024-01-04T09:15:30.332Z",
    "dateReserved": "2022-06-14T12:21:15.314Z",
    "dateUpdated": "2025-05-22T18:20:49.318Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5769 (GCVE-0-2023-5769)

Vulnerability from cvelistv5 – Published: 2023-12-14 16:19 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the webserver that affects the RTU500 series product versions listed below. A malicious actor could perform cross-site scripting on the webserver due to user input being improperly sanitized.
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 Affected: RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11
Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11
Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9
Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6
Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6
Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3
Create a notification for this product.
Date Public ?
2023-11-28 16:19
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:07:32.850Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9 "
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6 "
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3 "
            }
          ]
        }
      ],
      "datePublic": "2023-11-28T16:19:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to user input being improperly sanitized.\n\n\n"
            }
          ],
          "value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to user input being improperly sanitized.\n\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-14T16:19:51.846Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2023-5769",
    "datePublished": "2023-12-14T16:19:51.846Z",
    "dateReserved": "2023-10-25T15:24:39.863Z",
    "dateUpdated": "2024-08-02T08:07:32.850Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5768 (GCVE-0-2023-5768)

Vulnerability from cvelistv5 – Published: 2023-12-04 14:33 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. Incomplete or wrong received APDU frame layout may cause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer with wrong length information of APDU or delayed reception of data octets. Only communication link of affected HCI IEC 60870-5-104 is blocked. If attack sequence stops the communication to the previously attacked link gets normal again.
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 series Affected: RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11
Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11
Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9
Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6
Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6
Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:07:32.849Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500 series",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11 "
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9 "
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6 "
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3 "
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\u003cbr\u003e\u003cbr\u003eOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n"
            }
          ],
          "value": "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\n\nOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T14:35:49.612Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2023-5768",
    "datePublished": "2023-12-04T14:33:47.898Z",
    "dateReserved": "2023-10-25T15:24:39.183Z",
    "dateUpdated": "2024-08-02T08:07:32.849Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5767 (GCVE-0-2023-5767)

Vulnerability from cvelistv5 – Published: 2023-12-04 14:30 – Updated: 2024-08-02 08:07
VLAI?
Summary
A vulnerability exists in the webserver that affects the RTU500 series product versions listed below. A malicious actor could perform cross-site scripting on the webserver due to an RDT language file being improperly sanitized.
Assigner
Impacted products
Vendor Product Version
Hitachi Energy RTU500 Affected: RTU500 series CMU Firmware version 12.0.1 – 12.0.14
Affected: RTU500 series CMU Firmware version 12.2.1 – 12.2.11
Affected: RTU500 series CMU Firmware version 12.4.1 – 12.4.11
Affected: RTU500 series CMU Firmware version 12.6.1 – 12.6.9
Affected: RTU500 series CMU Firmware version 12.7.1 – 12.7.6
Affected: RTU500 series CMU Firmware version 13.2.1 – 13.2.6
Affected: RTU500 series CMU Firmware version 13.4.1 – 13.4.3
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:07:32.705Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "RTU500",
          "vendor": "Hitachi Energy",
          "versions": [
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.0.1 \u2013 12.0.14"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.2.1 \u2013 12.2.11"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.4.1 \u2013 12.4.11"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.6.1 \u2013 12.6.9"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 12.7.1 \u2013 12.7.6"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.2.1 \u2013 13.2.6"
            },
            {
              "status": "affected",
              "version": "RTU500 series CMU Firmware version 13.4.1 \u2013 13.4.3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to an RDT language file being improperly sanitized.\n\n\n"
            }
          ],
          "value": "\nA vulnerability exists in the webserver that affects the \nRTU500 series product versions listed below. A malicious \nactor could perform cross-site scripting on the webserver \ndue to an RDT language file being improperly sanitized.\n\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-04T14:30:24.550Z",
        "orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
        "shortName": "Hitachi Energy"
      },
      "references": [
        {
          "url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176\u0026languageCode=en\u0026Preview=true"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
    "assignerShortName": "Hitachi Energy",
    "cveId": "CVE-2023-5767",
    "datePublished": "2023-12-04T14:30:23.253Z",
    "dateReserved": "2023-10-25T15:24:37.775Z",
    "dateUpdated": "2024-08-02T08:07:32.705Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}