Hitachi Energy Modular Switchgear Monitoring (MSM)
Hitachi Energy Modular Switchgear Monitoring (MSM) versions 2.2 and earlier contain cross-site request forgery (CWE-352) and HTTP response splitting (CWE-113) vulnerabilities. Successful exploitation could allow an attacker to perform malicious command injection, trick authorized users into downloading malicious software to their computers, or pose as a legitimate user to perform unauthorized actions on the MSM system. The vulnerabilities can be exploited remotely via phishing emails containing malicious links to the MSM system, but require user interaction (clicking the link).
- User must click a malicious link in an email
- Link must be to the MSM system
- User must be authorized to access MSM
- User must have a web browser capable of executing embedded scripts
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6fa66c58-30e1-462e-a6ec-e44329dd0079Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.