Multiple Vulnerabilities in Hitachi Energy RTU500 Series
Hitachi Energy RTU500 series CMU firmware contains an unsafe file upload vulnerability (CWE-434) that allows authenticated attackers to upload or transfer files of dangerous types that are automatically processed by the device. Affected firmware versions include 12.0.1–12.0.14, 12.2.1–12.2.11, 12.4.1–12.4.11, 12.6.1–12.6.9, 12.7.1–12.7.6, 13.2.1–13.2.6, 13.4.1–13.4.4, and 13.5.1–13.5.3. Hitachi Energy has released patches only for versions 12.7.1–12.7.6 (update to 12.7.7) and 13.2.1–13.2.6 (update to 13.2.7). For other affected versions, the vendor recommends network segmentation, firewall rules, physical access controls, and other compensating controls.
- Network access to RTU500 CMU management interface (port/protocol details not specified in advisory)
- Valid engineering or maintenance credentials for the CMU
- Knowledge of the file types the device will automatically process
Patching may require device reboot — plan for process interruption
/api/v1/advisories/20f1097f-6d23-4f54-bf3a-0a08700e7668Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.