Hitachi Energy RTU500 Series
Multiple vulnerabilities in Hitachi Energy RTU500 series devices (CWE-476: null pointer dereference, CWE-354: improper validation, CWE-611: XML external entity injection, CWE-122 and CWE-121: buffer overflows, CWE-190: integer overflow, CWE-776: improper restriction) allow remote attackers without authentication to trigger denial-of-service conditions. Affected firmware versions include 12.7.1–12.7.7, 13.4.1–13.4.4, 13.5.1–13.5.3, 13.6.1, and 13.7.1–13.7.6. The vulnerabilities can be exploited over the network with low complexity to crash RTU500 devices or exhaust system resources.
- Network connectivity to the RTU500 device
- No authentication required
- Device running one of the affected firmware versions (12.7.1–12.7.7, 13.4.1–13.4.4, 13.5.1–13.5.3, 13.6.1, or 13.7.1–13.7.6)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/eff1c5fa-b355-4159-ba8e-d60d753c2aedGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.