cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-2617,https://securityvulnerability.io/vulnerability/CVE-2024-2617,Bypass Secure Update Vulnerability in RTU500,"A vulnerability in the RTU500 series from Hitachi Energy enables authenticated and authorized users to circumvent secure firmware update mechanisms. This exploitation could allow an attacker to install unsigned firmware, potentially compromising system integrity and security. The vulnerability emphasizes the need for robust security measures to prevent unauthorized firmware modifications, especially in critical infrastructure contexts.",Hitachi,Rtu500 Series Cmu Firmware,7.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-04-30T12:57:37.143Z,0 CVE-2024-1532,https://securityvulnerability.io/vulnerability/CVE-2024-1532,Stb-Language File Handling Vulnerability Affects RTU500 Series Products,"A vulnerability exists in the stb-language file handling that affects the RTU500 series product versions listed below. A malicious actor could enforce diagnostic texts being displayed as empty strings, if an authorized user uploads a specially crafted stb-language file.",Hitachi,Rtu500 Series Cmu Firmware,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-27T01:52:15.671Z,0 CVE-2024-1531,https://securityvulnerability.io/vulnerability/CVE-2024-1531,Vulnerability in stb-language file handling affects RTU500 series products,"A vulnerability in the stb-language file handling within Hitachi Energy's RTU500 series products poses a risk where a malicious actor can exploit the system by uploading a specially crafted stb-language file. This action may result in the unauthorized printing of random memory content into the RTU500 system log, potentially exposing sensitive information. Users of the affected RTU500 series versions are advised to remain vigilant and consider applying necessary security measures to mitigate this risk.",Hitachi,Rtu500 Series Cmu Firmware,8.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-27T01:45:44.463Z,0 CVE-2022-2081,https://securityvulnerability.io/vulnerability/CVE-2022-2081,HCI Modbus TCP Vulnerability in Hitachi Energy Products,"The vulnerability in the HCI Modbus TCP function of Hitachi Energy's RTU500 arises due to inadequate flood control. When this function is enabled, an attacker can exploit the vulnerability by sending a series of specially crafted messages at a rapid rate, leading to the reboot of the targeted RTU500 CMU. This exploit stems from an internal stack overflow condition triggered by the overwhelming input, potentially disrupting operations relying on the affected systems. Organizations utilizing RTU500 devices should assess their configurations to mitigate this risk effectively.",Hitachi,Rtu500 Series Cmu Firmware,7.5,HIGH,0.0007800000021234155,false,,false,false,false,,,false,false,,2024-01-04T10:15:00.000Z,0 CVE-2023-6711,https://securityvulnerability.io/vulnerability/CVE-2023-6711,Buffer Overflow Vulnerability in RTU500 Series by Hitachi Energy,"A vulnerability has been identified in the RTU500 series, where specially crafted messages sent to the SCI IEC 60870-5-104 and HCI IEC 60870-5-104 components are inadequately validated. This oversight can lead to a buffer overflow, potentially resulting in the unexpected reboot of an RTU500 CMU, disrupting crucial industrial control operations.",Hitachi,Rtu500 Series Cmu Firmware,7.5,HIGH,0.0007800000021234155,false,,false,false,false,,,false,false,,2023-12-19T15:15:00.000Z,0 CVE-2023-1514,https://securityvulnerability.io/vulnerability/CVE-2023-1514,Spoofing Vulnerability in RTU500 Scripting Interface by Hitachi Energy,"A vulnerability in the RTU500 Scripting interface allows attackers to spoof the identity of the RTU500 device. When a client connects using TLS, the server's certificate must confirm the service's legitimacy. If this validation process fails, an attacker can impersonate the device and intercept communications, compromising the integrity of the data exchanged.",Hitachi,RTU500 Scripting Interface,7.4,HIGH,0.0006399999838322401,false,,false,false,false,,,false,false,,2023-12-19T15:15:00.000Z,0 CVE-2023-5769,https://securityvulnerability.io/vulnerability/CVE-2023-5769,Cross-Site Scripting Vulnerability in RTU500 Series from Hitachi Energy,"A vulnerability has been identified in the webserver of Hitachi Energy's RTU500 series products, where user input is not adequately sanitized. This oversight allows a malicious actor to execute cross-site scripting attacks, potentially leading to unauthorized actions or data exposure within the affected systems.",Hitachi,RTU500,5.4,MEDIUM,0.0006300000241026282,false,,false,false,false,,,false,false,,2023-12-14T17:15:00.000Z,0 CVE-2023-5767,https://securityvulnerability.io/vulnerability/CVE-2023-5767,Cross-Site Scripting Vulnerability in Hitachi Energy's RTU500 Series,"A cross-site scripting vulnerability has been identified in the web server of Hitachi Energy's RTU500 series products. This issue arises from improper sanitization of an RDT language file, allowing malicious actors to inject arbitrary JavaScript code. If exploited, this vulnerability could compromise the integrity of web applications hosted on the RTU500 series, potentially leading to unauthorized access and manipulation of sensitive data. Users are advised to review their systems and apply necessary mitigations to secure against these types of attacks.",Hitachi,RTU500,6.1,MEDIUM,0.0006300000241026282,false,,false,false,false,,,false,false,,2023-12-04T15:15:00.000Z,0 CVE-2023-5768,https://securityvulnerability.io/vulnerability/CVE-2023-5768,Communication Blocking Vulnerability in Hitachi Energy's RTU500 Series,"A vulnerability in the HCI IEC 60870-5-104 protocol affects Hitachi Energy's RTU500 series, where improper handling of APDU frame layouts can lead to communication link blockage. Specifically, erroneous or delayed reception of APDU frames can result in an endless blocking state within the link layer. This scenario impairs the communication functionality but is temporarily resolved once the attack sequence ceases, restoring normal link operations.",Hitachi,RTU500 series,6.1,MEDIUM,0.0006300000241026282,false,,false,false,false,,,false,false,,2023-12-04T15:15:00.000Z,0 CVE-2022-4608,https://securityvulnerability.io/vulnerability/CVE-2022-4608,Stack Overflow Vulnerability in RTU500 Series by Hitachi Energy,"A stack overflow vulnerability exists in the HCI IEC 60870-5-104 function of specific RTU500 series versions configured with IEC 62351-3 support. When the session resumption interval expires, an update of session parameters initiated by the RTU500 can lead to unexpected restarts, potentially compromising the system's reliability.",Hitachi,Rtu500 Series,7.5,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2023-07-26T05:26:42.720Z,0 CVE-2022-2502,https://securityvulnerability.io/vulnerability/CVE-2022-2502,Buffer Overflow in RTU500 Series by Hitachi Energy,"A buffer overflow vulnerability exists in the HCI IEC 60870-5-104 functionality within certain RTU500 series devices. This vulnerability arises when the HCI is configured to support IEC 62351-5, and the CMU is equipped with the ‘Advanced security’ license. If these conditions are met, an attacker could exploit the vulnerability by sending crafted messages to the RTU500, potentially leading to a restart of the RTU500 CMU. The underlying cause is a lack of input data validation which can result in an internal buffer overflow.",Hitachi,Rtu500 Series,7.5,HIGH,0.000859999970998615,false,,false,false,false,,,false,false,,2023-07-26T05:25:27.002Z,0 CVE-2022-3353,https://securityvulnerability.io/vulnerability/CVE-2022-3353,IEC 61850 MMS-Server Vulnerability in multiple Hitachi Energy Products," A vulnerability exists in the IEC 61850 communication stack that affects multiple Hitachi Energy products.  An attacker could exploit the vulnerability by using a specially crafted message sequence, to force the IEC 61850 MMS-server communication stack, to stop accepting new MMS-client connections.  Already existing/established client-server connections are not affected. List of affected CPEs: * cpe:2.3:o:hitachienergy:fox61x_tego1:r15b08:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16_3:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r1e01:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r1d02:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r1c07:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r1b02:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:gms600:1.3.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.1.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.5.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0.1:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.2:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.8.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.0.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.4:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.5:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2.1:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3.1:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4.1:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:mms:2.2.3:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:pwc600:1.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:pwc600:1.1:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:pwc600:1.2:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:reb500:7:*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:reb500:8:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion670:1.2.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion670:2.0.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion650:1.1.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion650:1.3.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion650:2.1.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion670:2.1.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.1:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.5:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion670:2.2.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion650:2.2.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:rtu500cmu:12.*.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:rtu500cmu:13.*.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:2.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:3.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:txpert_hub_coretec_5:3.0:*:*:*:*:*:*:* ",Hitachi,"Fox61x Tego1,Gms600,Itt600 Sa Explorer,Microscada X Sys600,Msm,Pwc600,Reb500,Relion® 670,Relion® 650,Sam600-io,Rtu500,Txpert Hub Coretec 4,Txpert Hub Coretec 5",5.9,MEDIUM,0.00930000003427267,false,,false,false,false,,,false,false,,2023-02-21T13:50:46.145Z,0 CVE-2022-28613,https://securityvulnerability.io/vulnerability/CVE-2022-28613,Specially Crafted Modbus TCP Packet Vulnerability in RTU500 series,"A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is en-abled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the receiving RTU500 CMU to reboot. The vulnerability is caused by the validation error in the length information carried in MBAP header in the HCI Modbus TCP function.",Hitachi,Rtu500 Series Cmu Firmware,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-05-02T19:15:00.000Z,0 CVE-2021-35533,https://securityvulnerability.io/vulnerability/CVE-2021-35533,Specially Crafted IEC 60870-5-104 Packet Vulnerability in RTU500 series,"Improper Input Validation vulnerability in the APDU parser in the Bidirectional Communication Interface (BCI) IEC 60870-5-104 function of Hitachi Energy RTU500 series allows an attacker to cause the receiving RTU500 CMU of which the BCI is enabled to reboot when receiving a specially crafted message. By default, BCI IEC 60870-5-104 function is disabled (not configured). This issue affects: Hitachi Energy RTU500 series CMU Firmware version 12.0.* (all versions); CMU Firmware version 12.2.* (all versions); CMU Firmware version 12.4.* (all versions).",Hitachi,Rtu500 Series,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2021-11-17T00:00:00.000Z,0