Hitachi Energy MACH GWS Products
Hitachi Energy MACH GWS contains multiple vulnerabilities in versions 2.1.0.0 through 3.3.0.0 that allow code injection (CWE-943), path traversal (CWE-22), session hijacking (CWE-294), and authentication bypass (CWE-306). Successful exploitation by an attacker with local access could result in arbitrary code execution, unauthorized file access or modification, hijacked user sessions, or access to unauthenticated ports. This affects gateway systems that bridge control networks and IT networks in energy transmission and distribution operations.
- Local access to the MACH GWS system (physical or via compromised network host)
- Low privilege user account or physical access to the device
- Affected software versions 2.1.0.0 through 3.3.0.0
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5c7e2f44-256e-4b11-ade6-83ac8b3c6aa5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.