Lucene search

K
cve[email protected]CVE-2022-2502
HistoryJul 26, 2023 - 6:15 a.m.

CVE-2022-2502

2023-07-2606:15:09
CWE-120
CWE-20
web.nvd.nist.gov
13
cve-2022-2502
hci iec 60870-5-104
rtu500 series
vulnerability
iec 62351-5
buffer overflow
nvd
security

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.0%

A vulnerability exists in the HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product. The vulnerability can only be exploited, if the HCI 60870-5-104 is configured with support for IEC 62351-5 and the CMU contains the license feature โ€˜Advanced securityโ€™ which must be ordered separately. If these preconditions are fulfilled, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a missing input data validation which eventually if exploited causes an internal buffer to overflow in the HCI IEC 60870-5-104 function.

Affected configurations

NVD
Node
hitachienergyrtu500Match-
AND
hitachienergyrtu500_firmwareMatch13.3.1
OR
hitachienergyrtu500_firmwareMatch13.3.2
OR
hitachienergyrtu500_firmwareMatch13.3.3
OR
hitachienergyrtu500_firmwareMatch13.4.1

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "RTU500 series",
    "vendor": "Hitachi Energy",
    "versions": [
      {
        "status": "affected",
        "version": "RTU500 series CMU Firmware version 13.3.1"
      },
      {
        "status": "affected",
        "version": "RTU500 series CMU Firmware version 13.3.2"
      },
      {
        "status": "unaffected",
        "version": "RTU500 series CMU Firmware version 13.3.3"
      },
      {
        "status": "unaffected",
        "version": "RTU500 series CMU Firmware version 13.4.1"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.0%

Related for CVE-2022-2502