Impact
An unprivileged user can read sensitive user management information from the RTU500 web interface when using browser development utilities. The flaw does not expose the data through the normal user interface, but the information is still present and can be accessed by tools that bypass the usual privilege checks. This grants confidentiality exposure of user accounts and configuration details, potentially enabling further exploitation or credential compromise.
Affected Systems
The vulnerability affects Hitachi Energy RTU500 series CMU firmware, specifically the RTU520, RTU530, RTU540, and RTU560 models running firmware versions listed as 13.8.1. The impacted devices share common hardware identifiers and may be deployed in industrial control environments.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation at this time. The flaw is not listed in the CISA Known Exploited Vulnerabilities catalog, which reduces confidence in widespread active use. Exploitation likely requires network access to the RTU500’s web interface, making it a local or network-based attack vector understood to be viable in environments where remote administrators or malicious actors can reach the device via LAN or VPN.
OpenCVE Enrichment