First published: Thu Nov 04 2021(Updated: )
Improper Access Control vulnerability in the application authentication and authorization of Hitachi Energy Retail Operations, Counterparty Settlement and Billing (CSB) allows an attacker to execute a modified signed Java Applet JAR file. A successful exploitation may lead to data extraction or modification of data inside the application. This issue affects: Hitachi Energy Retail Operations 5.7.3 and prior versions. Hitachi Energy Counterparty Settlement and Billing (CSB) 5.7.3 prior versions.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachienergy Counterparty Settlements And Billing | <=5.7.3 | |
Hitachienergy Retail Operations | <=5.7.3 |
- Vulnerability is remediated in Retail Operations v5.7.3.1 - Vulnerability is remediated in CSB v5.7.3.1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-35528.
The severity of CVE-2021-35528 is high with a severity value of 7.1.
The Hitachi Energy Retail Operations, Counterparty Settlement and Billing (CSB) software versions up to 5.7.3 are affected by CVE-2021-35528.
An attacker can exploit CVE-2021-35528 by executing a modified signed Java Applet JAR file.
Yes, you can find references for CVE-2021-35528 at the following links: [Link 1](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000067&LanguageCode=en&DocumentPartId=&Action=Launch), [Link 2](https://search.abb.com/library/Download.aspx?DocumentID=8DBD000068&LanguageCode=en&DocumentPartId=&Action=Launch).