Hitachi Energy FOXMAN-UN
FOXMAN-UN contains multiple cryptographic and encryption vulnerabilities (CWE-326: inadequate encryption strength, CWE-321: use of hard-coded cryptographic key, CWE-319: cleartext transmission, CWE-1394: use of inherently dangerous function) that allow an attacker with network access to intercept or manipulate management communications, gain unauthorized access to managed network elements, or cause availability disruptions. The affected versions are R9C, R10C, R11A, R11B, R14A, R14B, R15A, and R15B. Successful exploitation could allow an unauthorized user to obtain sensitive information, gain access to network elements managed by FOXMAN-UN, and cause availability issues.
- Network access to FOXMAN-UN management interface (NMS CLIENT/SERVER port)
- No credentials required for initial interception of unencrypted traffic
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6ce37ad8-9b52-44a7-97d3-c7e86ad71df9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.