A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is en-abled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the receiving RTU500 CMU to reboot. The vulnerability is caused by the validation error in the length information carried in MBAP header in the HCI Modbus TCP function.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:57
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Sep 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
References |
|
|
Summary | (en) A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is en-abled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the receiving RTU500 CMU to reboot. The vulnerability is caused by the validation error in the length information carried in MBAP header in the HCI Modbus TCP function. |
21 Jul 2023, 16:43
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1284 |
Information
Published : 2022-05-02 19:15
Updated : 2024-11-21 06:57
NVD link : CVE-2022-28613
Mitre link : CVE-2022-28613
CVE.ORG link : CVE-2022-28613
JSON object : View
Products Affected
hitachienergy
- rtu500
- rtu500_firmware
abb
- rtu500_firmware
CWE
CWE-1284
Improper Validation of Specified Quantity in Input