Hitachi Energy FOX61x, FOXCST, and FOXMAN-UN Products
Hitachi Energy FOXMAN-UN, FOX61x, and FOXCST products contain a certificate validation weakness (CWE-297) that could allow an attacker on the same network or with physical access to intercept or falsify data exchanged between the client and server. This affects configuration and management of energy control systems. The vulnerability is not remotely exploitable and requires network proximity or physical access to the communication path. Affected versions: FOXMAN-UN R16B PC2 and earlier, R15B and earlier, FOX61x less than R16B, and FOXCST less than 16.2.1. End-of-life versions (FOXMAN-UN R16A, R15A, and older) will not receive patches.
- Network access to the FOXMAN-UN client-server communication path
- Physical proximity to network cable or network segment where FOXMAN-UN communicates
- No user interaction required for data interception
Patching may require device reboot — plan for process interruption
/api/v1/advisories/72bdd9e4-abde-466c-9868-8eb7333953d9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.