Vulnerability Description
A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is en-abled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the receiving RTU500 CMU to reboot. The vulnerability is caused by the validation error in the length information carried in MBAP header in the HCI Modbus TCP function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Abb | Rtu500 Firmware | >= 12.2.1.0, < 12.2.12.0 |
| Hitachienergy | Rtu500 Firmware | >= 12.0.1.0, < 12.0.14.0 |
| Hitachienergy | Rtu500 | - |
Related Weaknesses (CWE)
References
- https://publisher.hitachienergy.com/preview?DocumentID=8DBD000103&LanguageCode=e
- https://search.abb.com/library/Download.aspx?DocumentID=8DBD000103&LanguageCode=
FAQ
What is CVE-2022-28613?
CVE-2022-28613 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is en-abled and configured, an attacker could exploit the vulnerability by se...
How severe is CVE-2022-28613?
CVE-2022-28613 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-28613?
Check the references section above for vendor advisories and patch information. Affected products include: Abb Rtu500 Firmware, Hitachienergy Rtu500 Firmware, Hitachienergy Rtu500.