Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-1514


A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.


Published

2023-12-19T15:15:08.037

Last Modified

2024-11-21T07:39:20.810

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.4 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-295
  • Type: Primary
    CWE-295

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application hitachienergy rtu500_scripting_interface 1.0.1.30 Yes
Application hitachienergy rtu500_scripting_interface 1.0.2 Yes
Application hitachienergy rtu500_scripting_interface 1.1.1 Yes

References