Hitachi Energy APM Edge
Hitachi Energy APM Edge versions 1.0, 2.0, and 3.0 contain multiple memory safety vulnerabilities (null pointer dereference, out-of-bounds access, use-after-free) that can be triggered by a network request without authentication. Successful exploitation causes the APM Edge application to crash, rendering the monitoring system inaccessible. The vulnerability is not remotely exploitable in the sense of direct Internet attack but is exploitable from any device on the local network with connectivity to the APM Edge port.
- Network access to APM Edge device
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ddd7a6be-48c1-4517-ba47-2108658beab3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.