Hitachi Energy RTU500 Series (Update B)
Multiple denial-of-service vulnerabilities exist in Hitachi Energy RTU500 series CMU (Communications Management Unit) firmware. The vulnerabilities result from null pointer dereference (CWE-476), improper resource initialization (CWE-410), and improper resource validation (CWE-820). Exploitation requires network access to the CMU management interface and high-level administrator privileges. Successful exploitation causes the CMU process to become unresponsive, preventing legitimate monitoring and control operations. Affected firmware versions include 12.0.1–12.0.14, 12.2.1–12.2.12, 12.4.1–12.4.11, 12.6.1–12.6.10, 12.7.1–12.7.7, 13.2.1–13.2.7, 13.4.1–13.4.4, 13.5.1–13.5.3, 13.6.1, and 13.7.1–13.7.4. No active exploitation has been reported.
- Network access to RTU500 CMU management interface
- High-level administrative or operator credentials
- Knowledge of vulnerable firmware versions in your fleet
- Ability to craft network requests to the CMU
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cd0a8615-01e6-4beb-9d6e-0d88b247211b