Hitachi Energy XMC20
Hitachi Energy XMC20 contains a RADIUS authentication forgery vulnerability (CWE-924) that allows attackers to bypass message authentication if the RADIUS Message-Authenticator option is not enabled. Successful exploitation can lead to unauthorized access with potential impact on confidentiality, integrity, and availability. The vulnerability only affects deployments using remote RADIUS authentication. Versions R17A and earlier have no fix available; R18 is available but requires manual enablement of Message-Authenticator.
- Network access to the RADIUS communication path between XMC20 and the RADIUS server
- XMC20 configured to use remote RADIUS authentication
- RADIUS Message-Authenticator option disabled on either the XMC20 or RADIUS server
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5ec9e64f-6bb0-4af7-b334-fb5598563fc6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.