Hitachi Energy RTU500 Scripting Interface

Plan PatchCVSS 7.4ICS-CERT ICSA-24-331-05Nov 26, 2024
Hitachi EnergyEnergyWater
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityHigh
User InteractionNone needed
Summary

RTU500 Scripting interface contains an improper certificate validation vulnerability (CWE-295) that could allow attackers to spoof the identity of the service. The vulnerability affects versions 1.0.1.30, 1.0.2, and 1.1.1. Successful exploitation could grant attackers the ability to impersonate the RTU500 service, potentially enabling further compromise of the device.

What this means
What could happen
An attacker who can intercept network traffic to the RTU500 Scripting interface could impersonate the legitimate service, potentially leading to command injection, credential theft, or malicious configuration changes on the RTU device and downstream control systems.
Who's at risk
Energy utilities and water authorities using Hitachi Energy RTU500 Remote Terminal Units with the Scripting interface should be concerned. The RTU500 is a critical communication device in SCADA and process control networks that manages real-time field data and control commands. Compromise could affect substation automation, generation control, water treatment systems, or distribution network operations.
How it could be exploited
An attacker on the network must intercept traffic between a client and the RTU500 Scripting interface. By performing a man-in-the-middle attack and spoofing the service identity due to lack of proper certificate validation, the attacker can trick the client into accepting malicious commands or responses, or trick the RTU500 into accepting unauthorized control instructions.
Prerequisites
  • Network access to the RTU500 Scripting interface communication port
  • Ability to perform man-in-the-middle attack (same network segment or compromised router)
  • RTU500 device running affected version (1.0.1.30, 1.0.2, or 1.1.1)
remotely exploitableimproper certificate validationhigh attack complexity requires network positionaffects energy and water critical infrastructure
Exploitability
Unlikely to be exploited — EPSS score 0.1%
Public Proof-of-Concept (PoC) on GitHub (1 repository)
Affected products (3)
3 with fix
ProductAffected VersionsFix Status
RTU500 Scripting interface=1.0.1.30=1.2.1
RTU500 Scripting interface=1.0.2=1.2.1
RTU500 Scripting interface=1.1.1=1.2.1
Remediation & Mitigation
0/5
Do now
0/2
RTU500 Scripting interface
HARDENINGRestrict network access to the RTU500 Scripting interface using firewall rules, limiting connections to authorized engineering workstations only
All products
HARDENINGIsolate RTU500 and scripting interface from direct internet connection
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

RTU500 Scripting interface
HOTFIXUpdate RTU500 Scripting interface to version 1.2.1 or later
Long-term hardening
0/2
HARDENINGDeploy the RTU500 on a separate network segment from business IT systems using a firewall with minimal ports exposed
HARDENINGFollow Hitachi Energy's 'Remote Terminal Units Security Deployment Guideline' for proper RTU500 configuration and protection
API: /api/v1/advisories/b3dededa-8248-4e6b-9fcc-9f0fe780d292

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.

Hitachi Energy RTU500 Scripting Interface | CVSS 7.4 - OTPulse