Hitachienergy

Microscada X Sys600

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.46%
  • Veröffentlicht 27.08.2024 13:15:06
  • Zuletzt bearbeitet 28.08.2024 16:24:07

The product exposes a service that is intended for local only to all network interfaces without any authentication.

  • EPSS 0.33%
  • Veröffentlicht 27.08.2024 13:15:06
  • Zuletzt bearbeitet 30.10.2024 15:29:26

An HTTP parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials...

  • EPSS 0.48%
  • Veröffentlicht 27.08.2024 13:15:05
  • Zuletzt bearbeitet 30.10.2024 15:33:12

The MicroSCADA Pro/X SYS600 product allows an authenticated user input to control or influence paths or file names that are used in filesystem operations. If exploited the vulnerability allows the attacker to access or modify system files or other fi...

  • EPSS 0.05%
  • Veröffentlicht 27.08.2024 13:15:05
  • Zuletzt bearbeitet 30.10.2024 15:32:23

An attacker with local access to machine where MicroSCADA X SYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level i...

  • EPSS 0.37%
  • Veröffentlicht 27.08.2024 13:15:05
  • Zuletzt bearbeitet 30.10.2024 15:31:41

A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to successfully exploit this vulnerability an attacker mu...

  • EPSS 0.27%
  • Veröffentlicht 21.11.2022 19:15:13
  • Zuletzt bearbeitet 23.07.2025 21:15:25

An input validation vulnerability exists in the Monitor Pro interface of MicroSCADA Pro and MicroSCADA X SYS600. An authenticated user can launch an administrator level remote code execution irrespective of the authenticated user's role.

  • EPSS 0.27%
  • Veröffentlicht 14.09.2022 18:15:10
  • Zuletzt bearbeitet 21.11.2024 06:59:11

Improper Input Validation vulnerability in the handling of a malformed IEC 104 TCP packet in the Hitachi Energy MicroSCADA X SYS600, MicroSCADA Pro SYS600. Upon receiving a malformed IEC 104 TCP packet, the malformed packet is dropped, however the TC...

  • EPSS 0.51%
  • Veröffentlicht 14.09.2022 18:15:10
  • Zuletzt bearbeitet 21.11.2024 06:59:58

Improper Input Validation vulnerability in the handling of a specially crafted IEC 61850 packet with a valid data item but with incorrect data type in the IEC 61850 OPC Server in the Hitachi Energy MicroSCADA X SYS600, MicroSCADA Pro SYS600. The vuln...

  • EPSS 0.11%
  • Veröffentlicht 14.09.2022 18:15:10
  • Zuletzt bearbeitet 21.11.2024 07:00:40

Improper Input Validation vulnerability exists in the Hitachi Energy MicroSCADA X SYS600's ICCP stack during the ICCP communication establishment causes a denial-of-service when ICCP of SYS600 is request to forward any data item updates with timestam...

  • EPSS 0.28%
  • Veröffentlicht 14.09.2022 18:15:09
  • Zuletzt bearbeitet 21.11.2024 06:41:26

Improper Input Validation vulnerability in Hitachi Energy MicroSCADA X SYS600 while reading a specific configuration file causes a buffer-overflow that causes a failure to start the SYS600. The configuration file can only be accessed by an administra...