Hitachi Energy MACH PS700
A privilege escalation vulnerability exists in Intel chipset software bundled with Hitachi Energy MACH PS700 v2 System. Successful exploitation requires local access to an engineering workstation and low-level user privileges. An attacker could escalate privileges to administrative level and execute arbitrary commands, potentially gaining control over power system configuration and operation. The vulnerability has high attack complexity and is not remotely exploitable. Hitachi Energy has indicated no firmware patch is planned for this product; mitigation relies on patch scripts and network isolation.
- Local access to MACH PS700 v2 workstation
- Low-level user privileges (non-administrative account)
- User interaction (triggering the vulnerable code path)
- High attack complexity (specific conditions must align)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1129f48d-7529-45ba-af14-29d12bf2cef4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.