FKIE_CVE-2026-1772
Vulnerability from fkie_nvd - Published: 2026-02-24 14:16 - Updated: 2026-02-27 18:56
Severity ?
Summary
RTU500 web interface: An unprivileged user can read user management information. The information cannot be accessed via the RTU500 web user interface but requires further tools like browser development utilities to access them without required privileges.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "064FFA76-2AD3-425F-B003-4D038C941E7D",
"versionEndIncluding": "12.7.7",
"versionStartIncluding": "12.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC2DF255-AB45-4CAE-A7BD-0B2A1B5D04D6",
"versionEndIncluding": "13.5.4",
"versionStartIncluding": "13.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB44D4BF-8F0F-4770-A150-A5469A262A5A",
"versionEndIncluding": "13.6.2",
"versionStartIncluding": "13.6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "432CB425-58CC-47E2-847D-5E3FD31F8EB3",
"versionEndExcluding": "13.7.8",
"versionStartIncluding": "13.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu520_firmware:13.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D034F19D-920A-44DE-A886-6021242FF6E3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hitachienergy:rtu520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11AF93AD-200F-47A6-BA2C-F82165AFB50D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50ECC099-2676-45CE-82DA-4A6943452976",
"versionEndIncluding": "12.7.7",
"versionStartIncluding": "12.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D5D8077-C84A-4821-9F89-76A0F4664927",
"versionEndIncluding": "13.5.4",
"versionStartIncluding": "13.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89FAF654-7F2C-4918-B074-6CB685E885D8",
"versionEndIncluding": "13.6.2",
"versionStartIncluding": "13.6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0561AA77-CE68-4C93-8611-630FB07B507C",
"versionEndExcluding": "13.7.8",
"versionStartIncluding": "13.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu530_firmware:13.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45F698BE-5EDF-46DF-8B1E-96AC8894AA64",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hitachienergy:rtu530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6F9377-E6BB-4DEA-9D87-0AF792CBAC57",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FCFA1FB7-1834-4425-9DDB-0C08140DAD4B",
"versionEndIncluding": "12.7.7",
"versionStartIncluding": "12.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B70918C5-85C2-40B8-8681-921942C41561",
"versionEndIncluding": "13.5.4",
"versionStartIncluding": "13.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "30F20A11-9ECB-4CC6-88C2-0CC96DFFABE2",
"versionEndIncluding": "13.6.2",
"versionStartIncluding": "13.6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "199A1127-9B24-46A6-9122-30FD2EF64F32",
"versionEndExcluding": "13.7.8",
"versionStartIncluding": "13.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu540_firmware:13.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4D49545F-C765-4579-89C5-01B1EBB45B36",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hitachienergy:rtu540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EEFDEF0-883D-402B-9CD4-333A145E3C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF5BF48F-4BDF-4D38-A836-221066FA6234",
"versionEndIncluding": "12.7.7",
"versionStartIncluding": "12.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C75F1BB5-558A-4292-BA2B-E77D811D5E09",
"versionEndIncluding": "13.5.4",
"versionStartIncluding": "13.5.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE20728-0C7A-4388-AA09-AC50C8AD51F9",
"versionEndIncluding": "13.6.2",
"versionStartIncluding": "13.6.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CCC0128-9A27-4F4A-B254-C0C31BDCA78B",
"versionEndExcluding": "13.7.8",
"versionStartIncluding": "13.7.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hitachienergy:rtu560_firmware:13.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9753BCF-0BE9-4B1A-88B4-0B0DE5F623CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hitachienergy:rtu560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "495DCBD6-D2D1-4295-81D1-6ACA1B2CA223",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RTU500 web interface: An unprivileged user can read user management information. The information cannot be accessed via the RTU500 web user interface but requires further tools like browser development utilities to access them without required privileges."
},
{
"lang": "es",
"value": "Interfaz web de RTU500: Un usuario sin privilegios puede leer informaci\u00f3n de gesti\u00f3n de usuarios. No se puede acceder a la informaci\u00f3n a trav\u00e9s de la interfaz de usuario web de RTU500, pero requiere herramientas adicionales como utilidades de desarrollo del navegador para acceder a ella sin los privilegios requeridos."
}
],
"id": "CVE-2026-1772",
"lastModified": "2026-02-27T18:56:47.210",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary"
}
]
},
"published": "2026-02-24T14:16:22.180",
"references": [
{
"source": "cybersecurity@hitachienergy.com",
"tags": [
"Vendor Advisory"
],
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000237\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-280"
}
],
"source": "cybersecurity@hitachienergy.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…