Spoofing Vulnerability in RTU500 Scripting Interface by Hitachi Energy
CVE-2023-1514
7.4HIGH
Summary
A vulnerability in the RTU500 Scripting interface allows attackers to spoof the identity of the RTU500 device. When a client connects using TLS, the server's certificate must confirm the service's legitimacy. If this validation process fails, an attacker can impersonate the device and intercept communications, compromising the integrity of the data exchanged.
Affected Version(s)
RTU500 Scripting Interface 1.0.1.30
RTU500 Scripting Interface 1.0.2
RTU500 Scripting Interface 1.1.1
References
CVSS V3.1
Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved