2023-12-04 17:00:23 +00:00
{
"id" : "CVE-2023-5768" ,
"sourceIdentifier" : "cybersecurity@hitachienergy.com" ,
"published" : "2023-12-04T15:15:07.793" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:42:27.003" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-04 17:00:23 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. \nIncomplete or wrong received APDU frame layout may \ncause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer \nwith wrong length information of APDU or delayed reception \nof data octets.\n\n\nOnly communication link of affected HCI IEC 60870-5-104 \nis blocked. If attack sequence stops the communication to \nthe previously attacked link gets normal again.\n\n"
2023-12-07 23:00:21 +00:00
} ,
{
"lang" : "es" ,
"value" : "Existe una vulnerabilidad en HCI IEC 60870-5-104 que afecta a las versiones de productos RTU500 series que se enumeran a continuaci\u00f3n. El dise\u00f1o de la trama APDU recibida incompleta o incorrecta puede provocar el bloqueo en la capa de enlace. La raz\u00f3n del error fue un bloqueo interminable al leer tramas entrantes en la capa de enlace con informaci\u00f3n de longitud incorrecta de APDU o recepci\u00f3n retrasada de octetos de datos. Solo se bloquea el enlace de comunicaci\u00f3n del HCI IEC 60870-5-104 afectado. Si la secuencia del ataque se detiene, la comunicaci\u00f3n con el enlace previamente atacado vuelve a ser normal."
2023-12-04 17:00:23 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "cybersecurity@hitachienergy.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.9 ,
"baseSeverity" : "MEDIUM" ,
2023-12-04 17:00:23 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-12-04 17:00:23 +00:00
} ,
"exploitabilityScore" : 2.2 ,
"impactScore" : 3.6
2024-12-08 03:06:42 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" ,
"baseScore" : 6.1 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 2.7
2023-12-04 17:00:23 +00:00
}
]
} ,
2023-12-07 23:00:21 +00:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.1" ,
"versionEndIncluding" : "12.0.14" ,
"matchCriteriaId" : "2E81BEA6-121C-48D7-BAA9-91D652E6BC1A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.2.1" ,
"versionEndIncluding" : "12.2.11" ,
"matchCriteriaId" : "2469A78A-6F37-4F4B-BED8-060914B2D0A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.4.1" ,
"versionEndIncluding" : "12.4.11" ,
"matchCriteriaId" : "E9E6934B-EBB2-45FB-8E4A-7D360CBA0F92"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.6.1" ,
"versionEndIncluding" : "12.6.9" ,
"matchCriteriaId" : "40D7C64F-54CC-4183-8420-011E2787541F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.7.1" ,
"versionEndIncluding" : "12.7.6" ,
"matchCriteriaId" : "BDD81EF6-9D45-4A2D-BFAA-D10005AEA046"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.2.1" ,
"versionEndIncluding" : "13.2.6" ,
"matchCriteriaId" : "8D5EFAE2-81D8-4E67-8515-137EAE453D6D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu520_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.4.1" ,
"versionEndIncluding" : "13.4.3" ,
"matchCriteriaId" : "DC740F55-F482-4BC2-9D39-D27F40EBB7C9"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hitachienergy:rtu520:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "11AF93AD-200F-47A6-BA2C-F82165AFB50D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.1" ,
"versionEndIncluding" : "12.0.14" ,
"matchCriteriaId" : "D9F00BAD-06B1-49BE-BD41-61DE749E1506"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.2.1" ,
"versionEndIncluding" : "12.2.11" ,
"matchCriteriaId" : "79BC5D4A-09B2-41FB-962A-CF580181EB2C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.4.1" ,
"versionEndIncluding" : "12.4.11" ,
"matchCriteriaId" : "A30CDB2F-E0CC-4440-9E59-AB339F94996F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.6.1" ,
"versionEndIncluding" : "12.6.9" ,
"matchCriteriaId" : "D6BC4865-4064-421C-A746-8CB3D9DBAD7B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.7.1" ,
"versionEndIncluding" : "12.7.6" ,
"matchCriteriaId" : "5995FE68-15EA-4CB6-A43C-49582E4DF58C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.2.1" ,
"versionEndIncluding" : "13.2.6" ,
"matchCriteriaId" : "6E5803D1-164F-40E2-A348-21538EE1787F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu530_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.4.1" ,
"versionEndIncluding" : "13.4.3" ,
"matchCriteriaId" : "74AE224C-8D72-4C5A-ABB7-CE447E26992C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hitachienergy:rtu530:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FC6F9377-E6BB-4DEA-9D87-0AF792CBAC57"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.1" ,
"versionEndIncluding" : "12.0.14" ,
"matchCriteriaId" : "BBD5E8FC-3FB5-4300-BBF4-DDAF573F20F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.2.1" ,
"versionEndIncluding" : "12.2.11" ,
"matchCriteriaId" : "803838B5-058E-436B-8CE5-BF711456F96B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.4.1" ,
"versionEndIncluding" : "12.4.11" ,
"matchCriteriaId" : "A0361A98-1496-4763-A489-DCAE0D0DF613"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.6.1" ,
"versionEndIncluding" : "12.6.9" ,
"matchCriteriaId" : "7DECEA34-8A96-4943-B351-5080C4D34996"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.7.1" ,
"versionEndIncluding" : "12.7.6" ,
"matchCriteriaId" : "AF24A6B2-D9CF-44DE-A470-A09753D3A1B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.2.1" ,
"versionEndIncluding" : "13.2.6" ,
"matchCriteriaId" : "2B890C79-2919-48F4-9431-3B92C48089C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu540_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.4.1" ,
"versionEndIncluding" : "13.4.3" ,
"matchCriteriaId" : "90834F09-E09B-46BE-94BC-5812E63DE98D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hitachienergy:rtu540:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6EEFDEF0-883D-402B-9CD4-333A145E3C75"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.0.1" ,
"versionEndIncluding" : "12.0.14" ,
"matchCriteriaId" : "8AC22007-6E39-4C5A-A392-139B43F819C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.2.1" ,
"versionEndIncluding" : "12.2.11" ,
"matchCriteriaId" : "6BDB5A36-9B2F-43F9-A81B-506C4660151F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.4.1" ,
"versionEndIncluding" : "12.4.11" ,
"matchCriteriaId" : "F25FBFD5-BC45-49C9-87D4-A9C05405490D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.6.1" ,
"versionEndIncluding" : "12.6.9" ,
"matchCriteriaId" : "63096BB3-C0F9-4089-B11C-DE958B150DA8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.7.1" ,
"versionEndIncluding" : "12.7.6" ,
"matchCriteriaId" : "CC2029C0-3710-4CBB-8CBE-9EBA5793506A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.2.1" ,
"versionEndIncluding" : "13.2.6" ,
"matchCriteriaId" : "CDFF9898-F8FF-4361-A22C-DD5E47054FED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hitachienergy:rtu560_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.4.1" ,
"versionEndIncluding" : "13.4.3" ,
"matchCriteriaId" : "18211DB4-DA86-4489-AFE1-48514160C1D4"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hitachienergy:rtu560:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "495DCBD6-D2D1-4295-81D1-6ACA1B2CA223"
}
]
}
]
}
] ,
2023-12-04 17:00:23 +00:00
"references" : [
{
"url" : "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176&languageCode=en&Preview=true" ,
2023-12-07 23:00:21 +00:00
"source" : "cybersecurity@hitachienergy.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176&languageCode=en&Preview=true" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-12-04 17:00:23 +00:00
}
]
}