Hitachi Energy UNEM
Hitachi Energy UNEM contains multiple critical vulnerabilities in authentication, input validation, SSL/TLS certificate verification, and command handling (CWE-288, CWE-88, CWE-122, CWE-295, CWE-259, CWE-307, CWE-312, CWE-286). Successful exploitation could allow remote code execution, denial of service, unintended command execution, or unauthorized access to sensitive information. Affected versions: UNEM R16B, R16B PC2-PC3, R15B, R15B PC4; older versions (R16A, R15A, pre-R15A) are end-of-life with no remediation planned. R16B PC3 and R15B PC5 (under development) contain fixes for some CVEs. Mitigation: update to patched versions, restrict network access, deny nemadm SSH logins, and implement defense-in-depth network segmentation.
- Network access to UNEM system
- No valid credentials required for several CVEs (remote code execution flaws exploit authentication weaknesses)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e74be3b6-1ce3-404b-944b-f88fa294e2cdGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.