1. EXECUTIVE SUMMARY
- CVSS v3 5.9
- ATTENTION: Exploitable remotely
- Vendor: Hitachi Energy
- Equipment: RTU500 series CMU
- Vulnerability: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’)
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following Hitachi Energy products are affected:
- RTU500 series CMU Firmware: Versions 12.0.1 through 12.0.14
- RTU500 series CMU Firmware: Versions 12.2.1 through 12.2.11
- RTU500 series CMU Firmware: Versions 12.4.1 through 12.4.11
- RTU500 series CMU Firmware: Versions 12.6.1 through 12.6.9
- RTU500 series CMU Firmware: Versions 12.7.1 through 12.7.6
- RTU500 series CMU Firmware: Versions 13.2.1 through 13.2.6
- RTU500 series CMU Firmware: Versions 13.4.1 through 13.4.3
- RTU500 series CMU Firmware: Version 13.5.1
3.2 Vulnerability Overview
3.2.1 Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) CWE-120
A vulnerability exists in SCI IEC 60870-5-104 and HCI IEC 60870-5-104 that affects the RTU500 series product. Specially crafted messages sent to the mentioned components are not validated properly and can result in buffer overflow and as final consequence to a reboot of an RTU500 CMU.
CVE-2023-6711 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
3.3 BACKGROUND
- CRITICAL INFRASTRUCTURE SECTORS: Energy
<
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: