Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9m5v-m5wp-xcm2

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

A vulnerability in the HCI Modbus TCP COMPONENT of Hitachi Energy RTU500 series CMU Firmware that is caused by the validation error in the length information carried in MBAP header allows an ATTACKER to reboot the device by sending a special crafted message. This issue affects: Hitachi Energy RTU500 series CMU Firmware 12.0.; 12.2.; 12.4.; 12.6.; 12.7.; 13.2..

A vulnerability in the HCI Modbus TCP COMPONENT of Hitachi Energy RTU500 series CMU Firmware that is caused by the validation error in the length information carried in MBAP header allows an ATTACKER to reboot the device by sending a special crafted message. This issue affects: Hitachi Energy RTU500 series CMU Firmware 12.0.; 12.2.; 12.4.; 12.6.; 12.7.; 13.2..

EPSS

Процентиль: 63%
0.00446
Низкий

7.5 High

CVSS3

Дефекты

CWE-1284
CWE-20

Связанные уязвимости

CVSS3: 7.5
nvd
почти 4 года назад

A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is en-abled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the receiving RTU500 CMU to reboot. The vulnerability is caused by the validation error in the length information carried in MBAP header in the HCI Modbus TCP function.

CVSS3: 7.5
fstec
почти 4 года назад

Уязвимость компонента HCI (Host Controller Interface), функционирующего по протоколу Modbus TCP, программируемых логических контроллеров Hitachi Energy RTU500 серии CMU, позволяющая нарушителю вызвать перезагрузку устройства

EPSS

Процентиль: 63%
0.00446
Низкий

7.5 High

CVSS3

Дефекты

CWE-1284
CWE-20