(I)IoT Security News
Critical vulnerabiliities, Hacks, ICS, IoT Security

Hitachi Energy IEC 61850 MMS-Server

1. EXECUTIVE SUMMARY

2. RISK EVALUATION

Successful exploitation of this vulnerability could cause products using the IEC 61850 MMS-server communication stack to stop accepting new MMS-client connections.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions Hitachi Energy equipment using the IEC 61850 communication stack are affected:

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER RESOURCE SHUTDOWN OR RELEASE CWE-404
An attacker could exploit the IEC 61850 MMS-Server communication stack by forcing the communication stack to stop accepting new MMS-client connections.

CVE-2022-3353 has been assigned to this vulnerability. A CVSS v3.1 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

3.3 BACKGROUND

3.4 RESEARCHER

Hitachi Energy reported this vulnerability to CISA.

4. MITIGATIONS

Hitachi Energy provided updates for the following products. Contact Hitachi Energy for update information.

For all versions, Hitachi Energy recommends that users apply these general mitigation factors: 

For more information, see the Hitachi Energy advisories for the corresponding affected products: 

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Source:
https://www.cisa.gov/news-events/ics-advisories/icsa-23-089-01

Related posts

Mitsubishi Electric MELSEC iQ-R series (Update A)

(I) IoT
4 years ago

Johnson Controls exacqVision (Update A)

(I) IoT
4 years ago

Siemens SIMATIC PCS 7, SIMATIC WinCC, and SIMATIC NET PC (Update E)

(I) IoT
4 years ago
Exit mobile version