Hitachi Energy RTU500 OpenLDAP
The RTU500 series CMU (Communications Module Unit) contains vulnerabilities in OpenLDAP handling (CWE-843, CWE-617) that allow remote attackers to cause denial-of-service conditions. The vulnerabilities affect firmware versions 12.6.X, 12.7.X, 13.0.X, 13.1.X, and 13.2.X when the CAM (Command Access Module) function is enabled. The CAM function is disabled by default. Exploitation requires only network access and no authentication or user interaction. Hitachi Energy has released firmware patches for most affected versions (v12.6.7, v12.7.2, v13.2.3) and recommends updating. Disabling the CAM function eliminates the attack surface if the module is not required.
- Network access to the RTU500 CMU on the port(s) used by the CAM function
- CAM (Command Access Module) function must be configured and enabled on the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/687f5957-9499-43f1-8785-a1d344ce5acfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.