First published: Tue Dec 19 2023(Updated: )
A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachienergy Rtu500 Scripting Interface | =1.0.1.30 | |
Hitachienergy Rtu500 Scripting Interface | =1.0.2 | |
Hitachienergy Rtu500 Scripting Interface | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1514 is classified as a moderate severity vulnerability.
To fix CVE-2023-1514, update the RTU500 Scripting Interface to version 1.1.1 or later.
CVE-2023-1514 affects versions 1.0.1.30, 1.0.2, and 1.1.1 of the Hitachienergy RTU500 Scripting Interface.
CVE-2023-1514 is a certificate validation vulnerability in the TLS connection process.
Yes, CVE-2023-1514 can be exploited remotely by a malicious client connecting to the server.