Description
A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function.
Published: 2024-01-04
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-34371 A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function.
History

Thu, 22 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Sep 2024 01:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120

Subscriptions

Hitachienergy Rtu520 Rtu520 Firmware Rtu530 Rtu530 Firmware Rtu540 Rtu540 Firmware Rtu560 Rtu560 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: Hitachi Energy

Published:

Updated: 2025-05-22T18:20:49.318Z

Reserved: 2022-06-14T12:21:15.314Z

Link: CVE-2022-2081

cve-icon Vulnrichment

Updated: 2024-08-03T00:24:44.276Z

cve-icon NVD

Status : Modified

Published: 2024-01-04T10:15:10.927

Modified: 2024-11-21T07:00:17.247

Link: CVE-2022-2081

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses