7.5
CVE-2023-1514
- EPSS 0.07%
- Published 19.12.2023 15:15:08
- Last modified 21.11.2024 07:39:20
- Source cybersecurity@hitachienergy.co
- Teams watchlist Login
- Open Login
A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.
Data is provided by the National Vulnerability Database (NVD)
Hitachienergy ≫ Rtu500 Scripting Interface Version1.0.1.30
Hitachienergy ≫ Rtu500 Scripting Interface Version1.0.2
Hitachienergy ≫ Rtu500 Scripting Interface Version1.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.215 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
|
cybersecurity@hitachienergy.com | 7.4 | 2.2 | 5.2 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
|
CWE-295 Improper Certificate Validation
The product does not validate, or incorrectly validates, a certificate.