Hitachi Energy MACH System Software
MACH SSW versions 5.0–7.17.0.0 contain an authorization bypass vulnerability (CWE-29, CWE-266) that allows authenticated users to read or write arbitrary files without proper authorization. An attacker with valid engineering credentials could exploit this flaw to access or modify critical system files and configuration data. Hitachi Energy has not released patches for affected versions and recommends network segmentation, access controls, and firewall restrictions as compensating controls pending availability of firmware updates.
- Valid engineering workstation credentials for MACH SSW
- Network access to MACH SSW management interface
- Access from within or through the control network (not internet-accessible by design)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bea4d9de-43db-47f1-8ca4-5a347a55ec40Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.