Hitachi Energy RTU500 series CMU

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v3 5.9
  • ATTENTION: Exploitable remotely
  • Vendor: Hitachi Energy
  • Equipment: RTU500 series CMU
  • Vulnerability: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following Hitachi Energy products are affected:

  • RTU500 series CMU Firmware: Versions 12.0.1 through 12.0.14
  • RTU500 series CMU Firmware: Versions 12.2.1 through 12.2.11
  • RTU500 series CMU Firmware: Versions 12.4.1 through 12.4.11
  • RTU500 series CMU Firmware: Versions 12.6.1 through 12.6.9
  • RTU500 series CMU Firmware: Versions 12.7.1 through 12.7.6
  • RTU500 series CMU Firmware: Versions 13.2.1 through 13.2.6
  • RTU500 series CMU Firmware: Versions 13.4.1 through 13.4.3
  • RTU500 series CMU Firmware: Version 13.5.1

3.2 Vulnerability Overview

3.2.1 Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) CWE-120

A vulnerability exists in SCI IEC 60870-5-104 and HCI IEC 60870-5-104 that affects the RTU500 series product. Specially crafted messages sent to the mentioned components are not validated properly and can result in buffer overflow and as final consequence to a reboot of an RTU500 CMU.

CVE-2023-6711 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

3.3 BACKGROUND