// For flags

CVE-2023-1514

 

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.

Existe una vulnerabilidad en RTU500 Scripting interface. Cuando un cliente se conecta a un servidor mediante TLS, el servidor presenta un certificado. Este certificado vincula una clave pública a la identidad del servicio y está firmado por Certification Authority (CA), lo que permite al cliente validar que se puede confiar en el servicio remoto y que no es malicioso. Si el cliente no valida los parámetros del certificado, los atacantes podrían falsificar la identidad del servicio. Un atacante podría aprovechar la vulnerabilidad falsificando la identidad de un dispositivo RTU500 e interceptando los mensajes iniciados a través de RTU500 Scripting interface.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-03-20 CVE Reserved
  • 2023-12-19 CVE Published
  • 2023-12-29 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-295: Improper Certificate Validation
CAPEC
  • CAPEC-151: Identity Spoofing
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Hitachienergy
Search vendor "Hitachienergy"
Rtu500 Scripting Interface
Search vendor "Hitachienergy" for product "Rtu500 Scripting Interface"
1.0.1.30
Search vendor "Hitachienergy" for product "Rtu500 Scripting Interface" and version "1.0.1.30"
-
Affected
Hitachienergy
Search vendor "Hitachienergy"
Rtu500 Scripting Interface
Search vendor "Hitachienergy" for product "Rtu500 Scripting Interface"
1.0.2
Search vendor "Hitachienergy" for product "Rtu500 Scripting Interface" and version "1.0.2"
-
Affected
Hitachienergy
Search vendor "Hitachienergy"
Rtu500 Scripting Interface
Search vendor "Hitachienergy" for product "Rtu500 Scripting Interface"
1.1.1
Search vendor "Hitachienergy" for product "Rtu500 Scripting Interface" and version "1.1.1"
-
Affected