Hitachi ABB Power Grids eSOMS Telerik
Hitachi ABB Power Grids eSOMS versions below 6.3 contain multiple critical vulnerabilities in the embedded Telerik software component. These flaws include improper file path handling (CWE-22), unsafe deserialization (CWE-502), inadequate input validation (CWE-20), weak cryptography (CWE-326), and insufficient credential protection (CWE-522). Successful exploitation allows unauthenticated remote attackers to upload malicious files, execute arbitrary code, or access sensitive information on the server. The vulnerabilities are actively exploited in the wild.
- Network access to the eSOMS server (typically port 80/443)
- No authentication required
- eSOMS version below 6.3
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bb4c3646-5f61-4b74-94e7-51a0b0f11e8bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.