Hitachi Energy PCM600 Update Manager
PCM600 Update Manager contains a certificate validation vulnerability (CWE-295) that allows an attacker with local access and valid user credentials to bypass software package authentication. Successful exploitation could allow installation of untrusted software packages on connected power system relays and protection devices. The attack requires high complexity and user interaction—specifically tricking a user into clicking a malicious link or opening an unsolicited attachment. The vulnerability is not remotely exploitable.
- Local access to the machine running PCM600 Update Manager
- Valid user credentials on that machine
- User must click a malicious link or open an unsolicited attachment
- High attack complexity (requires specific conditions)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ece2e281-2ca8-45b9-bdcf-b24fbfeda89aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.