7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
5.5 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
12.6%
A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energyโs PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database. An attacker who manages to get access to the exported backup file can exploit the vulnerability and obtain credentials of the IEDs. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs.
This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(500711);
script_version("1.7");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/04");
script_cve_id("CVE-2022-2513");
script_name(english:"Hitachi Energy IED Connectivity Packages and PCM600 Products Cleartext Storage of Sensitive Information (CVE-2022-2513)");
script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
script_set_attribute(attribute:"description", value:
"A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage
function in Hitachi Energy's PCM600 product included in the versions listed below, where IEDs credentials are stored in
a cleartext format in the PCM600 database. An attacker who manages to get access to the exported backup file can exploit
the vulnerability and obtain credentials of the IEDs. The credentials may be used to perform unauthorized modifications
such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs.
- A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack)
credential storage function in Hitachi Energy's PCM600 product included in the versions listed below,
where IEDs credentials are stored in a cleartext format in the PCM600 database. An attacker who manages to
get access to the exported backup file can exploit the vulnerability and obtain credentials of the IEDs.
The credentials may be used to perform unauthorized modifications such as loading incorrect
configurations, reboot the IEDs or cause a denial-of-service on the IEDs. (CVE-2022-2513)
This plugin only works with Tenable.ot. Please visit https://www.tenable.com/products/tenable-ot for more information.");
# https://search.abb.com/library/Download.aspx?DocumentID=8DBD000120&LanguageCode=en&DocumentPartId=&Action=Launch
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?650516de");
script_set_attribute(attribute:"see_also", value:"https://www.cisa.gov/news-events/ics-advisories/icsa-22-333-02");
script_set_attribute(attribute:"solution", value:
"The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original
can be found at CISA.gov.
Hitachi Energy released the following recommended immediate actions:
- Update to PCM600 v2.11 Hotfix 20220923 or apply mitigation factors/workarounds
Hitachi Energy recommends the following steps to mitigate the risk of vulnerability exploitation:
- Implement the least privilege principle, continuously revising permissions and accesses to PCM600 related resources,
including the backup file (a PCMI/PCMP file.)
- Use a firewall system with the minimal number of exposed ports to help protect a process control network from attacks
originating from outside the network.
- Protect process control systems from direct, physical access by unauthorized personnel.
- Ensure process control systems are not directly connected to the internet.
- Separate process control systems from other networks via network segmentation techniques.
- Avoid using process control systems for browsing the internet, instant messaging, or receiving emails.
- Scan removable storage media for malware prior to connection to a process control system.
For more information, see Hitachi Energyรขยยs Cybersecurity Advisory.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-2513");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(312);
script_set_attribute(attribute:"vuln_publication_date", value:"2022/11/22");
script_set_attribute(attribute:"patch_publication_date", value:"2022/11/22");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/11/30");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/o:abb:relion_650_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:abb:relion_670_firmware");
script_set_attribute(attribute:"cpe", value:"cpe:/o:abb:relion_sam600-io_firmware");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Tenable.ot");
script_copyright(english:"This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("tenable_ot_api_integration.nasl");
script_require_keys("Tenable.ot/ABB");
exit(0);
}
include('tenable_ot_cve_funcs.inc');
get_kb_item_or_exit('Tenable.ot/ABB');
var asset = tenable_ot::assets::get(vendor:'ABB');
var vuln_cpes = {
"cpe:/o:abb:relion_670_firmware" :
{"versionEndIncluding" : "3.4.1", "versionStartIncluding" : "3.0", "family" : "AbbRelion"},
"cpe:/o:abb:relion_650_firmware" :
{"versionEndIncluding" : "2.4.1", "versionStartIncluding" : "1.3", "family" : "AbbRelion"},
"cpe:/o:abb:relion_sam600-io_firmware" :
{"versionEndIncluding" : "1.2", "versionStartIncluding" : "1.0", "family" : "AbbRelion"}
};
tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);
Vendor | Product | Version | CPE |
---|---|---|---|
abb | relion_sam600-io_firmware | cpe:/o:abb:relion_sam600-io_firmware | |
abb | relion_670_firmware | cpe:/o:abb:relion_670_firmware | |
abb | relion_650_firmware | cpe:/o:abb:relion_650_firmware |
7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
5.5 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
12.6%