Hitachi ABB Power Grids TropOS
Hitachi ABB Power Grids TropOS firmware versions 8.9.4.8 and earlier contain multiple vulnerabilities (CWE-74, CWE-326, CWE-306, CWE-287, CWE-354, CWE-20) in Wi-Fi access point functionality. Successful exploitation allows an attacker to redirect connected clients to fake websites and extract sensitive data through man-in-the-middle style attacks on Wi-Fi traffic. These vulnerabilities are related to the FragAttacks Wi-Fi vulnerability family and require the attacker to be within Wi-Fi range of the access point.
- Physical proximity to the TropOS Wi-Fi access point (Wi-Fi range)
- Target client device must be connected or attempting to connect to the TropOS local SSID
- Wi-Fi access point must be enabled with local SSID broadcast active
Patching may require device reboot — plan for process interruption
/api/v1/advisories/45d4c6a1-6936-4c43-9a2a-2a7de3ca8872Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.