Логотип exploitDog
bind:CVE-2023-1514
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-1514

Количество 3

Количество 3

nvd логотип

CVE-2023-1514

около 2 лет назад

A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.

CVSS3: 7.4
EPSS: Низкий
github логотип

GHSA-r8hg-9v6r-2mq2

около 2 лет назад

A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.

CVSS3: 7.4
EPSS: Низкий
fstec логотип

BDU:2023-09049

около 2 лет назад

Уязвимость реализации протокола TLS инструмента обработки сценариев RTU500 Scripting interface программируемых логических контроллеров Hitachi Energy RTU500, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и проводить спуфинг-атаки

CVSS3: 7.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-1514

A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.

CVSS3: 7.4
0%
Низкий
около 2 лет назад
github логотип
GHSA-r8hg-9v6r-2mq2

A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.

CVSS3: 7.4
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-09049

Уязвимость реализации протокола TLS инструмента обработки сценариев RTU500 Scripting interface программируемых логических контроллеров Hitachi Energy RTU500, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и проводить спуфинг-атаки

CVSS3: 7.4
0%
Низкий
около 2 лет назад

Уязвимостей на страницу