First published: Wed Jul 26 2023(Updated: )
A vulnerability exists in HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product. The vulnerability can only be exploited, if the HCI 60870-5-104 is configured with support for IEC 62351-3. After session resumption interval is expired an RTU500 initiated update of session parameters causes an unexpected restart due to a stack overflow.
Credit: cybersecurity@hitachienergy.com cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachienergy Rtu500 Firmware | =13.3.1 | |
Hitachienergy Rtu500 Firmware | =13.3.2 | |
Hitachienergy Rtu500 Firmware | =13.3.3 | |
Hitachienergy Rtu500 Firmware | =13.4.1 | |
Hitachienergy Rtu500 | ||
All of | ||
Any of | ||
Hitachienergy Rtu500 Firmware | =13.3.1 | |
Hitachienergy Rtu500 Firmware | =13.3.2 | |
Hitachienergy Rtu500 Firmware | =13.3.3 | |
Hitachienergy Rtu500 Firmware | =13.4.1 | |
Hitachienergy Rtu500 |
Update to CMU Firmware versions 13.3.3 or 13.4.1.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4608 is a vulnerability that exists in the HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product.
The CVE-2022-4608 vulnerability can only be exploited if the HCI 60870-5-104 is configured with support for IEC 62351-3. After the session resumption interval is expired, an RTU500 initiated update of session parameters may cause the vulnerability to be exploited.
The RTU500 firmware versions 13.3.1, 13.3.2, 13.3.3, and 13.4.1 are affected by CVE-2022-4608.
The severity of CVE-2022-4608 is high with a score of 7.5.
To fix the CVE-2022-4608 vulnerability, it is recommended to update the affected RTU500 firmware to a version that does not contain the vulnerability.