HIGH · 7.5

CVE-2022-28613

A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is en-abled and configured, an attacker could exploit the vulnerability by se...

Vulnerability Description

A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is en-abled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the receiving RTU500 CMU to reboot. The vulnerability is caused by the validation error in the length information carried in MBAP header in the HCI Modbus TCP function.

CVSS Score

7.5

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
AbbRtu500 Firmware>= 12.2.1.0, < 12.2.12.0
HitachienergyRtu500 Firmware>= 12.0.1.0, < 12.0.14.0
HitachienergyRtu500-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-28613?

CVE-2022-28613 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is en-abled and configured, an attacker could exploit the vulnerability by se...

How severe is CVE-2022-28613?

CVE-2022-28613 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-28613?

Check the references section above for vendor advisories and patch information. Affected products include: Abb Rtu500 Firmware, Hitachienergy Rtu500 Firmware, Hitachienergy Rtu500.