Hitachi Energy MicroSCADA Pro X SYS600
This vulnerability affects Hitachi Energy MicroSCADA Pro X SYS600 due to improper input validation and insufficient access controls (CWE-20, CWE-269, CWE-284, CWE-241). An attacker with low-privilege user credentials can exploit the ICCP feature to execute arbitrary scripts, causing the SYS600 application to fail to start or enter a denial-of-service condition. Successful exploitation requires network access and low-level credentials, but the attack complexity is low. Systems running SYS600 version 9.4 FP2 Hotfix 4 and earlier, or version 10.3.1 and earlier are affected. Version 10.4 and later include the fix.
- Network access to the SYS600 system
- Low-privilege user credentials (local or remote login)
- ICCP feature enabled (default or explicitly configured)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fd1d7eba-14a7-4731-af01-a05c0941d888Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.