2024-05-19 02:03:31 +00:00

132 lines
4.3 KiB
JSON

{
"id": "CVE-2022-2502",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"published": "2023-07-26T06:15:09.760",
"lastModified": "2023-08-03T19:26:16.343",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in the HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product. The vulnerability can only be exploited, if the HCI 60870-5-104 is configured with support for IEC 62351-5 and the CMU contains the license feature \u2018Advanced security\u2019 which must be ordered separately. If these preconditions are fulfilled, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a missing input data validation which eventually if exploited causes an internal buffer to overflow in the HCI IEC 60870-5-104 function."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
},
{
"source": "cybersecurity@hitachienergy.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hitachienergy:rtu500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE94252D-03EE-451B-8322-B4DBC790C6E9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:13.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C444DE8E-5AC5-409B-8DA0-5C49A69076DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:13.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C55747C-E5DA-4444-B017-1994011A5EF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:13.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0997C03B-21AC-4767-856C-79833FB378A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hitachienergy:rtu500_firmware:13.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0763F03-C6C8-4104-9028-3CF265F289D5"
}
]
}
]
}
],
"references": [
{
"url": "https://search.abb.com/library/Download.aspx?DocumentID=8DBD000121&LanguageCode=en&DocumentPartId=&Action=Launch",
"source": "cybersecurity@hitachienergy.com",
"tags": [
"Vendor Advisory"
]
}
]
}