cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-2617,https://securityvulnerability.io/vulnerability/CVE-2024-2617,Bypass Secure Update Vulnerability in RTU500,"A vulnerability in the RTU500 series from Hitachi Energy enables authenticated and authorized users to circumvent secure firmware update mechanisms. This exploitation could allow an attacker to install unsigned firmware, potentially compromising system integrity and security. The vulnerability emphasizes the need for robust security measures to prevent unauthorized firmware modifications, especially in critical infrastructure contexts.",Hitachi,Rtu500 Series Cmu Firmware,7.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-04-30T12:57:37.143Z,0 CVE-2024-1532,https://securityvulnerability.io/vulnerability/CVE-2024-1532,Stb-Language File Handling Vulnerability Affects RTU500 Series Products,"A vulnerability exists in the stb-language file handling that affects the RTU500 series product versions listed below. A malicious actor could enforce diagnostic texts being displayed as empty strings, if an authorized user uploads a specially crafted stb-language file.",Hitachi,Rtu500 Series Cmu Firmware,6.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-27T01:52:15.671Z,0 CVE-2024-1531,https://securityvulnerability.io/vulnerability/CVE-2024-1531,Vulnerability in stb-language file handling affects RTU500 series products,"A vulnerability in the stb-language file handling within Hitachi Energy's RTU500 series products poses a risk where a malicious actor can exploit the system by uploading a specially crafted stb-language file. This action may result in the unauthorized printing of random memory content into the RTU500 system log, potentially exposing sensitive information. Users of the affected RTU500 series versions are advised to remain vigilant and consider applying necessary security measures to mitigate this risk.",Hitachi,Rtu500 Series Cmu Firmware,8.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-03-27T01:45:44.463Z,0 CVE-2022-2081,https://securityvulnerability.io/vulnerability/CVE-2022-2081,HCI Modbus TCP Vulnerability in Hitachi Energy Products,"The vulnerability in the HCI Modbus TCP function of Hitachi Energy's RTU500 arises due to inadequate flood control. When this function is enabled, an attacker can exploit the vulnerability by sending a series of specially crafted messages at a rapid rate, leading to the reboot of the targeted RTU500 CMU. This exploit stems from an internal stack overflow condition triggered by the overwhelming input, potentially disrupting operations relying on the affected systems. Organizations utilizing RTU500 devices should assess their configurations to mitigate this risk effectively.",Hitachi,Rtu500 Series Cmu Firmware,7.5,HIGH,0.0007800000021234155,false,,false,false,false,,,false,false,,2024-01-04T10:15:00.000Z,0 CVE-2023-6711,https://securityvulnerability.io/vulnerability/CVE-2023-6711,Buffer Overflow Vulnerability in RTU500 Series by Hitachi Energy,"A vulnerability has been identified in the RTU500 series, where specially crafted messages sent to the SCI IEC 60870-5-104 and HCI IEC 60870-5-104 components are inadequately validated. This oversight can lead to a buffer overflow, potentially resulting in the unexpected reboot of an RTU500 CMU, disrupting crucial industrial control operations.",Hitachi,Rtu500 Series Cmu Firmware,7.5,HIGH,0.0007800000021234155,false,,false,false,false,,,false,false,,2023-12-19T15:15:00.000Z,0 CVE-2022-28613,https://securityvulnerability.io/vulnerability/CVE-2022-28613,Specially Crafted Modbus TCP Packet Vulnerability in RTU500 series,"A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is en-abled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the receiving RTU500 CMU to reboot. The vulnerability is caused by the validation error in the length information carried in MBAP header in the HCI Modbus TCP function.",Hitachi,Rtu500 Series Cmu Firmware,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2022-05-02T19:15:00.000Z,0