Hitachi Energy IED Connectivity Packages and PCM600 Products (Update A)
Successful exploitation could allow an attacker to obtain sensitive credentials and gain access to affected products, perform unauthorized modifications, or provoke denial-of-service conditions. The vulnerability affects PCM600 and multiple Connectivity Packages (670, 650, SAM600-IO, GMS600, PWC600) used in Hitachi Energy IED (Intelligent Electronic Device) configuration and management. Credentials and sensitive data may be stored insecurely in backup files and configuration files (PCMI, PCMP, PCMA, PCMT).
- Local access to the machine running PCM600 or connectivity package software
- Access to backup files (PCMI, PCMP, PCMA, PCMT) or configuration directories
- No special privileges required to read stored credential files
Patching may require device reboot — plan for process interruption
/api/v1/advisories/39477182-4a7a-469f-b061-3fea3e5807beGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.