CVE-2024-2617 (GCVE-0-2024-2617)
Vulnerability from cvelistv5 – Published: 2024-04-30 12:57 – Updated: 2024-08-01 19:18
VLAI?
Summary
A vulnerability exists in the RTU500 that allows for authenticated and authorized users to bypass secure update. If a
malicious actor successfully exploits this vulnerability, they
could use it to update the RTU500 with unsigned firmware.
Severity ?
7.2 (High)
CWE
- CWE-358 - Improperly Implemented Security Check for Standard
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hitachi Energy | RTU500 series CMU firmware |
Affected:
13.2.1 , ≤ 13.2.7
(custom)
Affected: 13.4.1 , ≤ 13.4.4 (custom) Affected: 13.5.1 , ≤ 13.5.3 (custom) |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:hitachienergy:rtu500_firmware:13.2.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "rtu500_firmware",
"vendor": "hitachienergy",
"versions": [
{
"lessThanOrEqual": "13.2.7.0",
"status": "affected",
"version": "13.2.1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:hitachienergy:rtu500_firmware:13.4.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "rtu500_firmware",
"vendor": "hitachienergy",
"versions": [
{
"lessThanOrEqual": "13.4.4.0",
"status": "affected",
"version": "13.4.1.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:hitachienergy:rtu500_firmware:13.5.1.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "rtu500_firmware",
"vendor": "hitachienergy",
"versions": [
{
"lessThanOrEqual": "13.5.3.0",
"status": "affected",
"version": "13.5.1.0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-2617",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-30T16:11:48.392692Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-358",
"description": "CWE-358 Improperly Implemented Security Check for Standard",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:29:04.729Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:18:48.011Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000199\u0026languageCode=en\u0026Preview=true"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "RTU500 series CMU firmware",
"vendor": "Hitachi Energy",
"versions": [
{
"lessThanOrEqual": "13.2.7",
"status": "affected",
"version": "13.2.1",
"versionType": "custom"
},
{
"lessThanOrEqual": "13.4.4",
"status": "affected",
"version": "13.4.1",
"versionType": "custom"
},
{
"lessThanOrEqual": "13.5.3",
"status": "affected",
"version": "13.5.1",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\nA vulnerability exists in the RTU500 that allows for authenticated and authorized users to bypass secure update. If a\nmalicious actor successfully exploits this vulnerability, they\ncould use it to update the RTU500 with unsigned firmware.\n\n"
}
],
"value": "\nA vulnerability exists in the RTU500 that allows for authenticated and authorized users to bypass secure update. If a\nmalicious actor successfully exploits this vulnerability, they\ncould use it to update the RTU500 with unsigned firmware.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-30T12:57:37.143Z",
"orgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"shortName": "Hitachi Energy"
},
"references": [
{
"url": "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000199\u0026languageCode=en\u0026Preview=true"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e383dce4-0c27-4495-91c4-0db157728d17",
"assignerShortName": "Hitachi Energy",
"cveId": "CVE-2024-2617",
"datePublished": "2024-04-30T12:57:37.143Z",
"dateReserved": "2024-03-18T17:44:43.352Z",
"dateUpdated": "2024-08-01T19:18:48.011Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"\\nA vulnerability exists in the RTU500 that allows for authenticated and authorized users to bypass secure update. If a\\nmalicious actor successfully exploits this vulnerability, they\\ncould use it to update the RTU500 with unsigned firmware.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Existe una vulnerabilidad en el RTU500 que permite a los usuarios autenticados y autorizados omitir la actualizaci\\u00f3n segura. Si un actor malintencionado aprovecha con \\u00e9xito esta vulnerabilidad, podr\\u00eda usarla para actualizar el RTU500 con firmware sin firmar.\"}]",
"id": "CVE-2024-2617",
"lastModified": "2024-11-21T09:10:08.513",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cybersecurity@hitachienergy.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}]}",
"published": "2024-04-30T13:15:47.200",
"references": "[{\"url\": \"https://publisher.hitachienergy.com/preview?DocumentId=8DBD000199\u0026languageCode=en\u0026Preview=true\", \"source\": \"cybersecurity@hitachienergy.com\"}, {\"url\": \"https://publisher.hitachienergy.com/preview?DocumentId=8DBD000199\u0026languageCode=en\u0026Preview=true\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cybersecurity@hitachienergy.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-358\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-2617\",\"sourceIdentifier\":\"cybersecurity@hitachienergy.com\",\"published\":\"2024-04-30T13:15:47.200\",\"lastModified\":\"2024-11-21T09:10:08.513\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"\\nA vulnerability exists in the RTU500 that allows for authenticated and authorized users to bypass secure update. If a\\nmalicious actor successfully exploits this vulnerability, they\\ncould use it to update the RTU500 with unsigned firmware.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad en el RTU500 que permite a los usuarios autenticados y autorizados omitir la actualizaci\u00f3n segura. Si un actor malintencionado aprovecha con \u00e9xito esta vulnerabilidad, podr\u00eda usarla para actualizar el RTU500 con firmware sin firmar.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cybersecurity@hitachienergy.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-358\"}]}],\"references\":[{\"url\":\"https://publisher.hitachienergy.com/preview?DocumentId=8DBD000199\u0026languageCode=en\u0026Preview=true\",\"source\":\"cybersecurity@hitachienergy.com\"},{\"url\":\"https://publisher.hitachienergy.com/preview?DocumentId=8DBD000199\u0026languageCode=en\u0026Preview=true\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://publisher.hitachienergy.com/preview?DocumentId=8DBD000199\u0026languageCode=en\u0026Preview=true\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T19:18:48.011Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-2617\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-04-30T16:11:48.392692Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:hitachienergy:rtu500_firmware:13.2.1.0:*:*:*:*:*:*:*\"], \"vendor\": \"hitachienergy\", \"product\": \"rtu500_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"13.2.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"13.2.7.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:hitachienergy:rtu500_firmware:13.4.1.0:*:*:*:*:*:*:*\"], \"vendor\": \"hitachienergy\", \"product\": \"rtu500_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"13.4.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"13.4.4.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:hitachienergy:rtu500_firmware:13.5.1.0:*:*:*:*:*:*:*\"], \"vendor\": \"hitachienergy\", \"product\": \"rtu500_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"13.5.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"13.5.3.0\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-358\", \"description\": \"CWE-358 Improperly Implemented Security Check for Standard\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-04-30T16:07:24.339Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Hitachi Energy\", \"product\": \"RTU500 series CMU firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"13.2.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"13.2.7\"}, {\"status\": \"affected\", \"version\": \"13.4.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"13.4.4\"}, {\"status\": \"affected\", \"version\": \"13.5.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"13.5.3\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://publisher.hitachienergy.com/preview?DocumentId=8DBD000199\u0026languageCode=en\u0026Preview=true\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"\\nA vulnerability exists in the RTU500 that allows for authenticated and authorized users to bypass secure update. If a\\nmalicious actor successfully exploits this vulnerability, they\\ncould use it to update the RTU500 with unsigned firmware.\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\nA vulnerability exists in the RTU500 that allows for authenticated and authorized users to bypass secure update. If a\\nmalicious actor successfully exploits this vulnerability, they\\ncould use it to update the RTU500 with unsigned firmware.\\n\\n\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"e383dce4-0c27-4495-91c4-0db157728d17\", \"shortName\": \"Hitachi Energy\", \"dateUpdated\": \"2024-04-30T12:57:37.143Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-2617\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T19:18:48.011Z\", \"dateReserved\": \"2024-03-18T17:44:43.352Z\", \"assignerOrgId\": \"e383dce4-0c27-4495-91c4-0db157728d17\", \"datePublished\": \"2024-04-30T12:57:37.143Z\", \"assignerShortName\": \"Hitachi Energy\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…