Hitachi Energy RTU500 series
Multiple vulnerabilities in Hitachi Energy RTU500 series CMU (Communications Management Unit) Firmware allow an attacker with network access to eavesdrop on device communication, retrieve information from memory (CWE-126, CWE-125), or cause denial-of-service conditions. The vulnerabilities stem from insufficient data validation (CWE-203). Affected versions include 12.x, 13.x, and several others. Version 11.x is end-of-life and will not receive patches. Patches are available for some 12.x versions and later.
- Network access to the RTU500 CMU device or the network segment where it communicates with management systems
- No authentication or credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9d02c224-8b52-48ed-9c29-95b4f8994d69Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.