First published: Fri Nov 26 2021(Updated: )
Improper Input Validation vulnerability in the APDU parser in the Bidirectional Communication Interface (BCI) IEC 60870-5-104 function of Hitachi Energy RTU500 series allows an attacker to cause the receiving RTU500 CMU of which the BCI is enabled to reboot when receiving a specially crafted message. By default, BCI IEC 60870-5-104 function is disabled (not configured). This issue affects: Hitachi Energy RTU500 series CMU Firmware version 12.0.* (all versions); CMU Firmware version 12.2.* (all versions); CMU Firmware version 12.4.* (all versions).
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachienergy Rtu500 Firmware | =12.0 | |
Hitachienergy Rtu500 Firmware | =12.2 | |
Hitachienergy Rtu500 Firmware | =12.4 | |
Hitachienergy Rtu500 |
- Disable BCI IEC 60870-5-104 function by configuration if it is not used. - Update to RTU500 series CMU Firmware version 12.6.5.0 or later (e.g., RTU500 CMU Firmware version 12.7.* or CMU Firmware version 13.2.* or later).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-35533.
The severity of CVE-2021-35533 is high with a severity value of 7.5.
The affected software versions are 12.0, 12.2, and 12.4 of Hitachi Energy RTU500 firmware.
CVE-2021-35533 allows an attacker to cause the receiving RTU500 CMU to reboot when receiving a specially crafted message.
To fix CVE-2021-35533, update the Hitachi Energy RTU500 firmware to a version that is not vulnerable.