Hitachi Energy RTU500 Scripting Interface
Hitachi Energy RTU500 Scripting interface versions 1.0.1.30, 1.0.2, and 1.1.1 contain an improper certificate validation vulnerability (CWE-295) that allows attackers to spoof the identity of the service. Successful exploitation could enable attackers to intercept or forge communications from the scripting interface, potentially allowing them to impersonate the service to clients that connect to it. The vulnerability requires network access and has high attack complexity, meaning specific conditions must align for exploitation. No public exploits have been reported. Hitachi Energy recommends updating to version 1.2.1 and implementing network segmentation and physical security controls as described in the Remote Terminal Units Security Deployment Guideline.
- Network access to the RTU500 Scripting interface port
- Ability to intercept or position on the network path between the client and RTU500 service
- RTU500 Scripting interface versions 1.0.1.30, 1.0.2, or 1.1.1 in use
- High attack complexity—specific network conditions or timing required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b3dededa-8248-4e6b-9fcc-9f0fe780d292