Hitachi Energy MicroSCADA Pro/X SYS600 (Update A)
Multiple vulnerabilities (CVE-2024-4872, CVE-2024-3980, CVE-2024-3982, CVE-2024-7940, CVE-2024-7941) in Hitachi Energy MicroSCADA X SYS600 and MicroSCADA Pro SYS600 allow authenticated attackers to inject code into persistent data (CWE-943), manipulate the file system via path traversal (CWE-22), hijack user sessions (CWE-294, CWE-306), and perform phishing attacks (CWE-601). Affected versions: MicroSCADA X SYS600 versions 10.0–10.5, and MicroSCADA Pro SYS600 versions 9.4_FP2_HF1 through HF4. Successful exploitation could allow attackers to execute arbitrary code, modify configurations, or disrupt SCADA operations.
- Valid MicroSCADA user credentials or ability to compromise them through phishing
- Network access to the MicroSCADA X SYS600 or Pro SYS600 web interface (typically port 443 or application-specific ports)
- System must be running affected version (MicroSCADA X 10.0–10.5 or MicroSCADA Pro 9.4_FP2_HF1 through HF4)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/efc82865-88de-47ef-b69e-ed0bed5a47a6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.