First published: Tue Aug 27 2024(Updated: )
The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names that are used in filesystem operations. If exploited the vulnerability allows the attacker to access or modify system files or other files that are critical to the application.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Energy Microscada Pro Sys600 | =9.4-fixpack_1 | |
Hitachi Energy Microscada Pro Sys600 | =9.4-fixpack_2_hf1 | |
Hitachi Energy Microscada Pro Sys600 | =9.4-fixpack_2_hf2 | |
Hitachi Energy Microscada Pro Sys600 | =9.4-fixpack_2_hf3 | |
Hitachi Energy Microscada Pro Sys600 | =9.4-fixpack_2_hf4 | |
Hitachi Energy Microscada Pro Sys600 | =9.4-fixpack_2_hf5 | |
Hitachi Energy Microscada X Sys600 | >=10.0<10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3980 has a high severity rating due to its potential to allow authenticated attackers access to critical system files.
To remediate CVE-2024-3980, users should apply the latest security fixes provided by Hitachi Energy for the MicroSCADA Pro SYS600 product.
CVE-2024-3980 affects authenticated users of the MicroSCADA Pro SYS600 product, specifically versions 9.4 fixpack 1, 2, and 10.0 to 10.6.
Exploitation of CVE-2024-3980 can lead to unauthorized access or modification of sensitive system files by authenticated users.
The implications of CVE-2024-3980 include potential disruption of critical operations and compromise of sensitive system integrity.