Hitachi Energy RTU500 series
A buffer overflow vulnerability in Hitachi Energy RTU500 series CMU (Communication Module Unit) firmware affects devices with HCI Modbus TCP configured. Successful exploitation causes an internal buffer overflow that reboots the device, interrupting SCADA communications. The vulnerability is triggered by malformed Modbus TCP input and can be exploited remotely without authentication. Affected firmware versions include 12.0.x through 12.0.13.0, 12.2.x through 12.2.11.0, 12.4.x through 12.4.11.0, 12.6.x through 12.6.7.0, 12.7.x through 12.7.3.0, and 13.2.x through 13.2.4.0. Hitachi Energy has released firmware updates for each version branch. The vulnerability affects only devices with HCI Modbus TCP enabled; this function is disabled by default.
- Network access to RTU500 Modbus TCP port (default 502)
- HCI Modbus TCP function must be enabled on the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/54faa0b2-b345-46bf-800f-5cc9a3166162