Vulnerabilites related to hitachienergy - sam600ioconnectivitypackage
var-202211-1567
Vulnerability from variot
A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy’s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database and logs files. An attacker having get access to the exported backup file can exploit the vulnerability and obtain user credentials of the IEDs. Additionally, an attacker with administrator access to the PCM600 host machine can obtain other user credentials by analyzing database log files. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs. Hitachi Energy PCM600 is a simplified management tool for protection and control relays from Hitachi, Japan.
Hitachi Energy PCM600 has an information disclosure vulnerability. The vulnerability stems from the fact that IED credentials are stored in the PCM600 database in clear text
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202211-1567", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "pcm600", scope: "lte", trust: 1, vendor: "hitachienergy", version: "2.11", }, { model: "650connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "2.3.0", }, { model: "670connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "3.0.2", }, { model: "pwc600connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "1.1.1", }, { model: "sam600ioconnectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "1.1.0", }, { model: "650connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "2.2.2", }, { model: "670connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "3.2.6", }, { model: "pwc600connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "1.2.0", }, { model: "670connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "3.4.1", }, { model: "pwc600connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "1.3.0", }, { model: "650connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "2.4.1", }, { model: "gms600connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "1.3.1", }, { model: "pwc600connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "1.1.2", }, { model: "670connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "3.1.2", }, { model: "670connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "3.3.0", }, { model: "sam600ioconnectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "1.0.0", }, { model: "650connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "2.1.2", }, { model: "gms600connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "1.3.0", }, { model: "pwc600connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "1.1.0", }, { model: "sam600ioconnectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "1.2.0", }, { model: "650connectivitypackage", scope: "eq", trust: 1, vendor: "hitachienergy", version: "1.3.0", }, { model: "energy pcm600", scope: "eq", trust: 0.6, vendor: "hitachi", version: "2.6", }, { model: "energy relion", scope: "eq", trust: 0.6, vendor: "hitachi", version: "670>=3.0,<=3.4.1", }, { model: "energy relion", scope: "eq", trust: 0.6, vendor: "hitachi", version: "650>=1.3,<=2.4.1", }, { model: "energy relion sam600 io", scope: "gte", trust: 0.6, vendor: "hitachi", version: "1.0,<=1.2", }, { model: "energy gms600", scope: "gte", trust: 0.6, vendor: "hitachi", version: "1.3,<=1.3.1", }, { model: "energy pwc600", scope: "gte", trust: 0.6, vendor: "hitachi", version: "1.1,<=1.3", }, ], sources: [ { db: "CNVD", id: "CNVD-2022-86325", }, { db: "NVD", id: "CVE-2022-2513", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:hitachienergy:gms600connectivitypackage:1.3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:gms600connectivitypackage:1.3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.1.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.0.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:650connectivitypackage:2.4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:650connectivitypackage:2.3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:650connectivitypackage:2.2.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:650connectivitypackage:2.1.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:650connectivitypackage:1.3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:670connectivitypackage:3.3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:670connectivitypackage:3.2.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:670connectivitypackage:3.1.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:670connectivitypackage:3.0.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:670connectivitypackage:3.4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:hitachienergy:pcm600:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "2.11", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2022-2513", }, ], }, cve: "CVE-2022-2513", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "CNVD", availabilityImpact: "NONE", baseScore: 4.9, confidentialityImpact: "COMPLETE", exploitabilityScore: 3.9, id: "CNVD-2022-86325", impactScore: 6.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:L/AC:L/Au:N/C:C/I:N/A:N", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, { attackComplexity: "LOW", attackVector: "LOCAL", author: "cybersecurity@hitachienergy.com", availabilityImpact: "NONE", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 2.5, impactScore: 4, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, ], severity: [ { author: "NVD", id: "CVE-2022-2513", trust: 1, value: "MEDIUM", }, { author: "cybersecurity@hitachienergy.com", id: "CVE-2022-2513", trust: 1, value: "HIGH", }, { author: "CNVD", id: "CNVD-2022-86325", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202211-3282", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2022-86325", }, { db: "CNNVD", id: "CNNVD-202211-3282", }, { db: "NVD", id: "CVE-2022-2513", }, { db: "NVD", id: "CVE-2022-2513", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy’s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database and logs files. An attacker having get access to the exported backup file can exploit the vulnerability and obtain user credentials of the IEDs. Additionally, an attacker with administrator access to the PCM600 host machine can obtain other user credentials by analyzing database log files. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs. Hitachi Energy PCM600 is a simplified management tool for protection and control relays from Hitachi, Japan. \n\r\n\r\nHitachi Energy PCM600 has an information disclosure vulnerability. The vulnerability stems from the fact that IED credentials are stored in the PCM600 database in clear text", sources: [ { db: "NVD", id: "CVE-2022-2513", }, { db: "CNVD", id: "CNVD-2022-86325", }, { db: "VULMON", id: "CVE-2022-2513", }, ], trust: 1.53, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2022-2513", trust: 2.3, }, { db: "CNVD", id: "CNVD-2022-86325", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202211-3282", trust: 0.6, }, { db: "VULMON", id: "CVE-2022-2513", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2022-86325", }, { db: "VULMON", id: "CVE-2022-2513", }, { db: "CNNVD", id: "CNNVD-202211-3282", }, { db: "NVD", id: "CVE-2022-2513", }, ], }, id: "VAR-202211-1567", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2022-86325", }, ], trust: 1.6, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "ICS", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2022-86325", }, ], }, last_update_date: "2024-05-30T22:55:12.335000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Patch for Hitachi Energy PCM600 Information Disclosure Vulnerability", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/365576", }, { title: "Hitachi Energy PCM600 Security vulnerabilities", trust: 0.6, url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=215778", }, ], sources: [ { db: "CNVD", id: "CNVD-2022-86325", }, { db: "CNNVD", id: "CNNVD-202211-3282", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-312", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2022-2513", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.3, url: "https://search.abb.com/library/download.aspx?documentid=8dbd000120&languagecode=en&documentpartid=&action=launch", }, { trust: 1, url: "https://publisher.hitachienergy.com/preview?documentid=8dbd000120&languagecode=en&documentpartid=&action=launch", }, { trust: 0.6, url: "https://cxsecurity.com/cveshow/cve-2022-2513/", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "CNVD", id: "CNVD-2022-86325", }, { db: "VULMON", id: "CVE-2022-2513", }, { db: "CNNVD", id: "CNNVD-202211-3282", }, { db: "NVD", id: "CVE-2022-2513", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2022-86325", }, { db: "VULMON", id: "CVE-2022-2513", }, { db: "CNNVD", id: "CNNVD-202211-3282", }, { db: "NVD", id: "CVE-2022-2513", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-12-07T00:00:00", db: "CNVD", id: "CNVD-2022-86325", }, { date: "2022-11-22T00:00:00", db: "VULMON", id: "CVE-2022-2513", }, { date: "2022-11-22T00:00:00", db: "CNNVD", id: "CNNVD-202211-3282", }, { date: "2022-11-22T11:15:29.027000", db: "NVD", id: "CVE-2022-2513", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2022-12-09T00:00:00", db: "CNVD", id: "CNVD-2022-86325", }, { date: "2022-11-22T00:00:00", db: "VULMON", id: "CVE-2022-2513", }, { date: "2022-12-01T00:00:00", db: "CNNVD", id: "CNNVD-202211-3282", }, { date: "2024-05-28T11:15:10.083000", db: "NVD", id: "CVE-2022-2513", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-202211-3282", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Hitachi Energy PCM600 Information Disclosure Vulnerability", sources: [ { db: "CNVD", id: "CNVD-2022-86325", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "other", sources: [ { db: "CNNVD", id: "CNNVD-202211-3282", }, ], trust: 0.6, }, }
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:hitachienergy:650connectivitypackage:1.3.0:*:*:*:*:*:*:*", matchCriteriaId: "580D4B4A-12CF-4B8B-825E-DBEB1C3F2242", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:650connectivitypackage:2.1.2:*:*:*:*:*:*:*", matchCriteriaId: "E64BFE7A-5382-4F83-8E01-26EDAC92D9FB", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:650connectivitypackage:2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "CA0AA3CB-0E38-4569-9C64-87672ABBD162", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:650connectivitypackage:2.3.0:*:*:*:*:*:*:*", matchCriteriaId: "1A2581EB-33EA-497E-A0E6-7D00D43B0EDB", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:650connectivitypackage:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "DE0699BF-B243-4BF9-9163-72ACB3154D00", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:670connectivitypackage:3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "0A585BC1-3980-4E79-9215-53412CD9E2B1", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:670connectivitypackage:3.1.2:*:*:*:*:*:*:*", matchCriteriaId: "B2FDD877-410C-40F4-AD3C-C3755E9C1A9F", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:670connectivitypackage:3.2.6:*:*:*:*:*:*:*", matchCriteriaId: "32C0E59D-864E-4476-AFDF-22AE2B3E079F", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:670connectivitypackage:3.3.0:*:*:*:*:*:*:*", matchCriteriaId: "AF00C048-D36F-4DDB-9029-BFDA9AA5E43F", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:670connectivitypackage:3.4.1:*:*:*:*:*:*:*", matchCriteriaId: "7DF3A5A4-8406-46FC-8D30-23FC29B42150", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:gms600connectivitypackage:1.3.0:*:*:*:*:*:*:*", matchCriteriaId: "B215FF30-C19E-43C9-94FF-9AB8E91BB05D", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:gms600connectivitypackage:1.3.1:*:*:*:*:*:*:*", matchCriteriaId: "98CBC435-9430-4CCD-84A5-E3A8765ED968", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:pcm600:*:*:*:*:*:*:*:*", matchCriteriaId: "931A9615-9A1C-48BE-8C35-C758C688C557", versionEndIncluding: "2.11", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "2E2922A2-5025-4C34-9FFB-B82E176CEDE4", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "AC29C252-F7D0-4485-92D3-8E90CC52E3EE", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.1.2:*:*:*:*:*:*:*", matchCriteriaId: "42ADEC08-1D34-48B4-B6EE-66E359F52F0C", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "681A510D-AFA8-4DA2-B4CE-AA674E5B2366", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:pwc600connectivitypackage:1.3.0:*:*:*:*:*:*:*", matchCriteriaId: "B19C14A3-2A6E-4AE0-93EF-2DB675E0271E", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.0.0:*:*:*:*:*:*:*", matchCriteriaId: "AFDBF53B-3246-405D-AEE0-6845C23E7013", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.1.0:*:*:*:*:*:*:*", matchCriteriaId: "C4157638-A8CA-4088-8B27-8BD9D65E6537", vulnerable: true, }, { criteria: "cpe:2.3:a:hitachienergy:sam600ioconnectivitypackage:1.2.0:*:*:*:*:*:*:*", matchCriteriaId: "58A1A1CE-CDD3-42E7-B4A8-C6D104930917", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy’s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database and logs files. An attacker having get access to the exported backup file can exploit the vulnerability and obtain user credentials of the IEDs. Additionally, an attacker with administrator access to the PCM600 host machine can obtain other user credentials by analyzing database log files. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs.", }, { lang: "es", value: "Existe una vulnerabilidad en Intelligent Electronic Device (IED) Connectivity Package (ConnPack) la función de almacenamiento de credenciales del producto PCM600 de Hitachi Energy incluido en las versiones que se enumeran a continuación, donde las credenciales de los IED se almacenan en un formato de texto plano en la base de datos PCM600. Un atacante que logre acceder al archivo de copia de seguridad exportado puede explotar la vulnerabilidad y obtener las credenciales de los IED. Las credenciales se pueden utilizar para realizar modificaciones no autorizadas, como cargar configuraciones incorrectas, reiniciar los IED o provocar una Denegación de Servicio (DoS) en los IED.", }, ], id: "CVE-2022-2513", lastModified: "2024-11-21T07:01:09.000", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.5, impactScore: 4, source: "cybersecurity@hitachienergy.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-11-22T11:15:29.027", references: [ { source: "cybersecurity@hitachienergy.com", url: "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000120&LanguageCode=en&DocumentPartId=&Action=Launch", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000120&LanguageCode=en&DocumentPartId=&Action=Launch", }, ], sourceIdentifier: "cybersecurity@hitachienergy.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-312", }, ], source: "cybersecurity@hitachienergy.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-312", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2022-2513
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Hitachi Energy | PCM600 |
Version: v2.6 < |
||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T00:39:08.068Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000120&LanguageCode=en&DocumentPartId=&Action=Launch", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "PCM600", vendor: "Hitachi Energy", versions: [ { lessThanOrEqual: "2.11 Hotfix 20220617", status: "affected", version: "v2.6", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "670 Connectivity Package", vendor: "Hitachi Energy", versions: [ { lessThanOrEqual: "3.4.1", status: "affected", version: "3.0", versionType: "semver", }, ], }, { defaultStatus: "unaffected", product: "650 Connectivity Package", vendor: "Hitachi Energy", versions: [ { lessThanOrEqual: "2.4.1", status: "affected", version: "1.3", versionType: "semver", }, ], }, { defaultStatus: "unaffected", product: "SAM600-IO Connectivity Package", vendor: "Hitachi Energy", versions: [ { lessThanOrEqual: "1.2", status: "affected", version: "1.0", versionType: "semver", }, ], }, { defaultStatus: "unaffected", product: "GMS600 Connectivity Package", vendor: "Hitachi Energy", versions: [ { lessThanOrEqual: "1.3.1", status: "affected", version: "1.3", versionType: "semver", }, ], }, { defaultStatus: "unaffected", product: "PWC600 Connectivity Package", vendor: "Hitachi Energy", versions: [ { lessThanOrEqual: "1.3", status: "affected", version: "1.1", versionType: "semver", }, ], }, ], credits: [ { lang: "en", type: "reporter", user: "00000000-0000-4000-9000-000000000000", value: "PSE - Polskie Sieci Elektroenergetyczne (Polish Power Grid Company (PPGC))", }, ], datePublic: "2022-11-15T13:30:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy’s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database and logs files. An attacker having get access to the exported backup file can exploit the vulnerability and obtain user credentials of the IEDs. Additionally, an attacker with administrator access to the PCM600 host machine can obtain other user credentials by analyzing database log files. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs.<br><br>", }, ], value: "A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy’s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database and logs files. An attacker having get access to the exported backup file can exploit the vulnerability and obtain user credentials of the IEDs. Additionally, an attacker with administrator access to the PCM600 host machine can obtain other user credentials by analyzing database log files. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs.", }, ], impacts: [ { capecId: "CAPEC-37", descriptions: [ { lang: "en", value: "CAPEC-37 Retrieve Embedded Sensitive Data", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-312", description: "CWE-312 Cleartext Storage of Sensitive Information", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-05-28T10:20:49.089Z", orgId: "e383dce4-0c27-4495-91c4-0db157728d17", shortName: "Hitachi Energy", }, references: [ { url: "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000120&LanguageCode=en&DocumentPartId=&Action=Launch", }, ], solutions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "Update to PCM600 v2.11 Hotfix 20240426 or apply mitigation\nfactors/workarounds as described in the Mitigation Factors/Workarounds Section.<br><br>List of CPEs: <br>cpe:2.3:a:hitachienergy:pcm600:*:*:*:*:*:*:*:*<br><br>cpe:2.3:a:hitachienergy:670ConnectivityPackage:3.4.1:*:*:*:*:*:*:*<br>\n\ncpe:2.3:a:hitachienergy:670ConnectivityPackage:3.3.0:*:*:*:*:*:*:*\n<br>\n\n\ncpe:2.3:a:hitachienergy:670ConnectivityPackage:3.2.6:*:*:*:*:*:*:*\n\n<br>\n\ncpe:2.3:a:hitachienergy:670ConnectivityPackage:3.1.2:*:*:*:*:*:*:*<br>\n\n\n\ncpe:2.3:a:hitachienergy:670ConnectivityPackage:3.0.2:*:*:*:*:*:*:*<br>\n\n<br>cpe:2.3:a:hitachienergy:650ConnectivityPackage:2.4.1:*:*:*:*:*:*:*<br>\n\ncpe:2.3:a:hitachienergy:650ConnectivityPackage:2.3.0:*:*:*:*:*:*:*<br>\n\n\n\ncpe:2.3:a:hitachienergy:650ConnectivityPackage:2.2.2:*:*:*:*:*:*:*<br>\n\n\n\ncpe:2.3:a:hitachienergy:650ConnectivityPackage:2.1.2:*:*:*:*:*:*:*<br>\n\n\n\ncpe:2.3:a:hitachienergy:650ConnectivityPackage:1.3.0:*:*:*:*:*:*:*<br>\n\n<br>cpe:2.3:a:hitachienergy:sam600ioConnectivityPackage:1.2.0:*:*:*:*:*:*:*<br>\n\ncpe:2.3:a:hitachienergy:sam600ioConnectivityPackage:1.1.0:*:*:*:*:*:*:*<br>\n\n\n\ncpe:2.3:a:hitachienergy:sam600ioConnectivityPackage:1.0.0:*:*:*:*:*:*:*\n\n<br><br>cpe:2.3:a:hitachienergy:pwc600ConnectivityPackage:1.3.0:*:*:*:*:*:*:*<br>\n\ncpe:2.3:a:hitachienergy:pwc600ConnectivityPackage:1.2.0:*:*:*:*:*:*:*\n\n<br>\n\ncpe:2.3:a:hitachienergy:pwc600ConnectivityPackage:1.1.2:*:*:*:*:*:*:*\n\n<br>\n\ncpe:2.3:a:hitachienergy:pwc600ConnectivityPackage:1.1.1:*:*:*:*:*:*:*\n\n<br>\n\ncpe:2.3:a:hitachienergy:pwc600ConnectivityPackage:1.1.0:*:*:*:*:*:*:*\n\n<br><br>cpe:2.3:a:hitachienergy:gms600ConnectivityPackage:1.3.1:*:*:*:*:*:*:*<br>\n\ncpe:2.3:a:hitachienergy:gms600ConnectivityPackage:1.3.0:*:*:*:*:*:*:*\n\n<br> \n\n<br>", }, ], value: "Update to PCM600 v2.11 Hotfix 20240426 or apply mitigation\nfactors/workarounds as described in the Mitigation Factors/Workarounds Section.\n\nList of CPEs: \ncpe:2.3:a:hitachienergy:pcm600:*:*:*:*:*:*:*:*\n\ncpe:2.3:a:hitachienergy:670ConnectivityPackage:3.4.1:*:*:*:*:*:*:*\n\n\ncpe:2.3:a:hitachienergy:670ConnectivityPackage:3.3.0:*:*:*:*:*:*:*\n\n\n\n\ncpe:2.3:a:hitachienergy:670ConnectivityPackage:3.2.6:*:*:*:*:*:*:*\n\n\n\n\ncpe:2.3:a:hitachienergy:670ConnectivityPackage:3.1.2:*:*:*:*:*:*:*\n\n\n\n\ncpe:2.3:a:hitachienergy:670ConnectivityPackage:3.0.2:*:*:*:*:*:*:*\n\n\n\ncpe:2.3:a:hitachienergy:650ConnectivityPackage:2.4.1:*:*:*:*:*:*:*\n\n\ncpe:2.3:a:hitachienergy:650ConnectivityPackage:2.3.0:*:*:*:*:*:*:*\n\n\n\n\ncpe:2.3:a:hitachienergy:650ConnectivityPackage:2.2.2:*:*:*:*:*:*:*\n\n\n\n\ncpe:2.3:a:hitachienergy:650ConnectivityPackage:2.1.2:*:*:*:*:*:*:*\n\n\n\n\ncpe:2.3:a:hitachienergy:650ConnectivityPackage:1.3.0:*:*:*:*:*:*:*\n\n\n\ncpe:2.3:a:hitachienergy:sam600ioConnectivityPackage:1.2.0:*:*:*:*:*:*:*\n\n\ncpe:2.3:a:hitachienergy:sam600ioConnectivityPackage:1.1.0:*:*:*:*:*:*:*\n\n\n\n\ncpe:2.3:a:hitachienergy:sam600ioConnectivityPackage:1.0.0:*:*:*:*:*:*:*\n\n\n\ncpe:2.3:a:hitachienergy:pwc600ConnectivityPackage:1.3.0:*:*:*:*:*:*:*\n\n\ncpe:2.3:a:hitachienergy:pwc600ConnectivityPackage:1.2.0:*:*:*:*:*:*:*\n\n\n\n\ncpe:2.3:a:hitachienergy:pwc600ConnectivityPackage:1.1.2:*:*:*:*:*:*:*\n\n\n\n\ncpe:2.3:a:hitachienergy:pwc600ConnectivityPackage:1.1.1:*:*:*:*:*:*:*\n\n\n\n\ncpe:2.3:a:hitachienergy:pwc600ConnectivityPackage:1.1.0:*:*:*:*:*:*:*\n\n\n\ncpe:2.3:a:hitachienergy:gms600ConnectivityPackage:1.3.1:*:*:*:*:*:*:*\n\n\ncpe:2.3:a:hitachienergy:gms600ConnectivityPackage:1.3.0:*:*:*:*:*:*:*", }, ], source: { advisory: "8DBD000120", discovery: "EXTERNAL", }, title: "Cleartext Credentials Vulnerability on Hitachi Energy’s Multiple IED Connectivity Packages (IED ConnPacks) and PCM600 Products", workarounds: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "It is recommended to implement and continuously revise least privileges principles to minimize permissions and\naccesses to PCM600 related resources, included the backup file, PCMI/PCMP file.<br><br> Recommended security\npractices and firewall configurations can help protect a process control network from attacks that originate from\noutside the network. Such practices include that process control systems are physically protected from direct\naccess by unauthorized personnel, have no direct connections to the Internet, and are separated from other\nnetworks by means of a firewall system that has a minimal number of ports exposed, and others that have to be\nevaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or\nreceiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses\nbefore they are connected to a control system. <br><br>An additional recommendation is to follow the hardening guidelines published by “The Center for Internet Security\n(CIS)” <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.cisecurity.org/about-us/\">https://www.cisecurity.org/about-us/</a> to protect the host Operating System.\n<br><br>More information to deploy PCM600 securely can be found in the following documents:\n1MRS758440, PCM600 Cyber Security Deployment Guideline\n\n\n\n\n<br>", }, ], value: "It is recommended to implement and continuously revise least privileges principles to minimize permissions and\naccesses to PCM600 related resources, included the backup file, PCMI/PCMP file.\n\n Recommended security\npractices and firewall configurations can help protect a process control network from attacks that originate from\noutside the network. Such practices include that process control systems are physically protected from direct\naccess by unauthorized personnel, have no direct connections to the Internet, and are separated from other\nnetworks by means of a firewall system that has a minimal number of ports exposed, and others that have to be\nevaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or\nreceiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses\nbefore they are connected to a control system. \n\nAn additional recommendation is to follow the hardening guidelines published by “The Center for Internet Security\n(CIS)” https://www.cisecurity.org/about-us/ to protect the host Operating System.\n\n\nMore information to deploy PCM600 securely can be found in the following documents:\n1MRS758440, PCM600 Cyber Security Deployment Guideline", }, ], x_generator: { engine: "Vulnogram 0.1.0-dev", }, }, }, cveMetadata: { assignerOrgId: "e383dce4-0c27-4495-91c4-0db157728d17", assignerShortName: "Hitachi Energy", cveId: "CVE-2022-2513", datePublished: "2022-11-22T10:30:34.309Z", dateReserved: "2022-07-22T13:30:13.171Z", dateUpdated: "2024-08-03T00:39:08.068Z", requesterUserId: "add9a720-9bad-45a2-bedc-fce6888e4172", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }