Lucene search

K
cveHitachi EnergyCVE-2023-6711
HistoryDec 19, 2023 - 3:15 p.m.

CVE-2023-6711

2023-12-1915:15:09
CWE-120
Hitachi Energy
web.nvd.nist.gov
20
sci
hci
iec 60870-5-104
vulnerability
rtu500
buffer overflow

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

17.0%

Vulnerability exists in SCI IEC 60870-5-104 and HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. Specially crafted messages sent to the mentioned components are not validated properly and can result in buffer overflow and as final consequence to a reboot of an RTU500 CMU.

Affected configurations

Nvd
Node
hitachienergyrtu500Match-
AND
hitachienergyrtu500_firmwareRange12.0.1.012.0.15.0
OR
hitachienergyrtu500_firmwareRange12.2.1.012.2.12.0
OR
hitachienergyrtu500_firmwareRange12.4.1.012.4.12.0
OR
hitachienergyrtu500_firmwareRange12.6.1.012.6.10.0
OR
hitachienergyrtu500_firmwareRange12.7.1.012.7.7.0
OR
hitachienergyrtu500_firmwareRange13.2.1.013.2.7.0
OR
hitachienergyrtu500_firmwareRange13.4.1.013.4.4.0
OR
hitachienergyrtu500_firmwareMatch13.5.1.0
VendorProductVersionCPE
hitachienergyrtu500-cpe:2.3:h:hitachienergy:rtu500:-:*:*:*:*:*:*:*
hitachienergyrtu500_firmware*cpe:2.3:o:hitachienergy:rtu500_firmware:*:*:*:*:*:*:*:*
hitachienergyrtu500_firmware13.5.1.0cpe:2.3:o:hitachienergy:rtu500_firmware:13.5.1.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "RTU500 series CMU Firmware",
    "vendor": "Hitachi Energy",
    "versions": [
      {
        "lessThanOrEqual": "12.0.14",
        "status": "affected",
        "version": "12.0.1",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "12.2.11",
        "status": "affected",
        "version": "12.2.1",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "12.4.11",
        "status": "affected",
        "version": "12.4.1",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "12.6.9",
        "status": "affected",
        "version": "12.6.1",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "12.7.6",
        "status": "affected",
        "version": "12.7.1",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "13.2.6",
        "status": "affected",
        "version": "13.2.1",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "13.4.3",
        "status": "affected",
        "version": "13.4.1",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "13.5.1"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

17.0%

Related for CVE-2023-6711