VAR-202208-1719

Vulnerability from variot - Updated: 2025-02-14 23:00

A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function. Hitachi Energy Provided by RTU500 series The following vulnerabilities exist in. RTU500 is a series of industrial control components of Hitachi, Japan, mainly used in industrial control systems. The vulnerability stems from enabling and configuring HCI Modbus TCP. Hitachi Energy RTU500

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202208-1719",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "rtu520",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.7.1"
      },
      {
        "model": "rtu520",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.2.1"
      },
      {
        "model": "rtu560",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.2.4"
      },
      {
        "model": "rtu560",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.4.1"
      },
      {
        "model": "rtu530",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.2.4"
      },
      {
        "model": "rtu540",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.2.4"
      },
      {
        "model": "rtu540",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.4.1"
      },
      {
        "model": "rtu530",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.2.1"
      },
      {
        "model": "rtu520",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.3.1"
      },
      {
        "model": "rtu560",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.6.7"
      },
      {
        "model": "rtu530",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.6.7"
      },
      {
        "model": "rtu520",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.2.11"
      },
      {
        "model": "rtu540",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.6.7"
      },
      {
        "model": "rtu520",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.0.1"
      },
      {
        "model": "rtu560",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.7.3"
      },
      {
        "model": "rtu530",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.4.11"
      },
      {
        "model": "rtu530",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.7.3"
      },
      {
        "model": "rtu560",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.0.13"
      },
      {
        "model": "rtu530",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.0.13"
      },
      {
        "model": "rtu540",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.7.3"
      },
      {
        "model": "rtu560",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.4.11"
      },
      {
        "model": "rtu540",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.0.13"
      },
      {
        "model": "rtu560",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.2.1"
      },
      {
        "model": "rtu530",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.7.1"
      },
      {
        "model": "rtu540",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.4.11"
      },
      {
        "model": "rtu530",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.6.1"
      },
      {
        "model": "rtu540",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.2.1"
      },
      {
        "model": "rtu530",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.2.1"
      },
      {
        "model": "rtu560",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.6.1"
      },
      {
        "model": "rtu560",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.7.1"
      },
      {
        "model": "rtu540",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.6.1"
      },
      {
        "model": "rtu560",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.2.1"
      },
      {
        "model": "rtu560",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.3.1"
      },
      {
        "model": "rtu520",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.2.4"
      },
      {
        "model": "rtu520",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.4.1"
      },
      {
        "model": "rtu530",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.3.1"
      },
      {
        "model": "rtu540",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.7.1"
      },
      {
        "model": "rtu540",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.2.1"
      },
      {
        "model": "rtu540",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "13.3.1"
      },
      {
        "model": "rtu530",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.0.1"
      },
      {
        "model": "rtu520",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.6.7"
      },
      {
        "model": "rtu520",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.4.11"
      },
      {
        "model": "rtu520",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.7.3"
      },
      {
        "model": "rtu520",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.0.13"
      },
      {
        "model": "rtu530",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.2.11"
      },
      {
        "model": "rtu540",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.2.11"
      },
      {
        "model": "rtu520",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.2.1"
      },
      {
        "model": "rtu540",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.0.1"
      },
      {
        "model": "rtu560",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.0.1"
      },
      {
        "model": "rtu560",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.2.11"
      },
      {
        "model": "rtu520",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.6.1"
      },
      {
        "model": "rtu530",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "hitachienergy",
        "version": "12.4.1"
      },
      {
        "model": "rtu540",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi energy",
        "version": null
      },
      {
        "model": "rtu560",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi energy",
        "version": null
      },
      {
        "model": "rtu530",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi energy",
        "version": null
      },
      {
        "model": "rtu520",
        "scope": null,
        "trust": 0.8,
        "vendor": "hitachi energy",
        "version": null
      },
      {
        "model": "energy rtu500 series cmu",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "12.0.1.0,\u003c=12.0.14.0"
      },
      {
        "model": "energy rtu500 series cmu",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "12.2.1.0,\u003c=12.2.11.0"
      },
      {
        "model": "energy rtu500 series cmu",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "12.4.1.0,\u003c=12.4.11.0"
      },
      {
        "model": "energy rtu500 series cmu",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "12.6.1.0,\u003c=12.6.7.0"
      },
      {
        "model": "energy rtu500 series cmu",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "12.7.1.0,\u003c=12.7.3.0"
      },
      {
        "model": "energy rtu500 series cmu",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "13.2.1.0,\u003c=13.2.4.0"
      },
      {
        "model": "energy rtu500 series cmu",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hitachi",
        "version": "13.3.1.0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-02742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002340"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2081"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hitachi Energy reported this vulnerability to CISA.",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202208-3793"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2022-2081",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2025-02742",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2022-2081",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 2.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2022-2081",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2022-2081",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "cybersecurity@hitachienergy.com",
            "id": "CVE-2022-2081",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2022-2081",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2025-02742",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202208-3793",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-02742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002340"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202208-3793"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2081"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2081"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function. Hitachi Energy Provided by RTU500 series The following vulnerabilities exist in. RTU500 is a series of industrial control components of Hitachi, Japan, mainly used in industrial control systems. The vulnerability stems from enabling and configuring HCI Modbus TCP. Hitachi Energy RTU500",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-2081"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002340"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-02742"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-2081"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-2081",
        "trust": 3.9
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-22-235-07",
        "trust": 2.1
      },
      {
        "db": "JVN",
        "id": "JVNVU95882646",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002340",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-02742",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202208-3793",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-2081",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-02742"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-2081"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002340"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202208-3793"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2081"
      }
    ]
  },
  "id": "VAR-202208-1719",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-02742"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-02742"
      }
    ]
  },
  "last_update_date": "2025-02-14T23:00:37.175000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Modbus\u00a0File\u00a0Write\u00a0Vulnerability\u00a0in\u00a0Hitachi\u00a0Energy \u2019 s\u00a0RTU500\u00a0series\u00a0Product\u00a0CVE-2022-2081 (( PDF)",
        "trust": 0.8,
        "url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000111\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
      },
      {
        "title": "Patch for Hitachi Energy RTU500 series CMU firmware buffer overflow vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/654836"
      },
      {
        "title": "Hitachi Energy RTU500 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=205284"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-02742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002340"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202208-3793"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.0
      },
      {
        "problemtype": "Stack-based buffer overflow (CWE-121) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002340"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2081"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.2,
        "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-235-07"
      },
      {
        "trust": 1.0,
        "url": "https://publisher.hitachienergy.com/preview?documentid=8dbd000111\u0026languagecode=en\u0026documentpartid=\u0026action=launch"
      },
      {
        "trust": 0.9,
        "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-235-07"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu95882646/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2081"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-02742"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-2081"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002340"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202208-3793"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2081"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-02742"
      },
      {
        "db": "VULMON",
        "id": "CVE-2022-2081"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002340"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202208-3793"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-2081"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-02-13T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2025-02742"
      },
      {
        "date": "2022-08-26T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-002340"
      },
      {
        "date": "2022-08-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202208-3793"
      },
      {
        "date": "2024-01-04T10:15:10.927000",
        "db": "NVD",
        "id": "CVE-2022-2081"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-02-12T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2025-02742"
      },
      {
        "date": "2024-04-30T08:51:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-002340"
      },
      {
        "date": "2022-08-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202208-3793"
      },
      {
        "date": "2024-09-25T01:15:32.237000",
        "db": "NVD",
        "id": "CVE-2022-2081"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Hitachi\u00a0Energy\u00a0 Made \u00a0RTU500\u00a0series\u00a0 Stack-based buffer overflow vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-002340"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202208-3793"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…