Hitachi Energy Gateway Station (GWS) Product
Hitachi Energy Gateway Station (GWS) versions 2.0.0.0 through 3.1.0.0 contain cryptographic or protocol weaknesses (CWE-1357) that allow remote attackers to intercept traffic between the gateway and connected systems without authentication. Successful exploitation enables eavesdropping on sensitive network traffic, unauthorized access to information flowing through the gateway, and denial-of-service conditions that could disrupt operational communications. The vulnerabilities are remotely exploitable with low attack complexity and no known public exploits at present.
- Network-level access to GWS (direct routing or VLAN access)
- GWS deployed in an affected version (2.0.0.0 through 3.1.0.0)
- No special credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d7e06d9d-62cb-42ef-b60d-15f62ee66acfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.