Hitachi Energy's RTU500 series NULL Pointer Deference (CVE-2024-10037)

medium Tenable OT Security Plugin ID 503158

Synopsis

The remote OT asset is affected by a vulnerability.

Description

A vulnerability exists in the RTU500 web server com- ponent that can cause a denial of service to the RTU500 CMU application if a specially crafted mes- sage sequence is executed on a WebSocket connec- tion.
An attacker must be properly authenticated and the test mode function of RTU500 must be enabled to ex- ploit this vulnerability.
The affected CMU will automatically recover itself if an attacker successfully exploits this vulnerability.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

Hitachi Energy has identified the following specific workarounds and mitigations users can apply to reduce risk:

- For all versions, apply general mitigation factors/workarounds. Upgrade the system once remediated version is available, or apply general mitigation factors.
- RTU500 series CMU 12.0.1 - 12.0.14, 12.2.1 - 12.2.12, 12.4.1 - 12.4.11, 12.6.1 - 12.6.10, 12.7.1 - 12.7.7: Update to version 12.7.8 when available.
- RTU500 series CMU version 13.2.1 - 13.2.7, 13.4.1 - 13.4.4, 13.5.1 - 13.5.3, 13.6.1: Update to version 13.7.1
- RTU500 series CMU 13.5.1 - 13.5.3: Update to version 13.5.4 when available.
- RTU500 series CMU 13.6.1: Update to version 13.6.2 when available.
- (CVE-2024-11499, CVE-2025-1445) RTU500 series CMU 13.7.1 - 13.7.4: Update to version 13.7.6 when available.
- (CVE-2024-12169) RTU500 series CMU 13.4.1 - 13.4.4, 13.5.1 - 13.5.3, 13.6.1, 13.7.1 - 13.7.4: Update to version 13.7.6 when available.

For more information see the associated Hitachi Energy PSIRT security advisory 8DBD000207.

Hitachi Energy recommends users implement recommended security practices and firewall configurations to help protect the process control network from attacks originating from outside the network. Process control systems should be physically protected from direct access by unauthorized personnel, have no direct connections to the Internet, and be separated from other networks by means of a firewall system with a minimal number of ports exposed. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails.
Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system.

For more information, see Hitachi Energy's Security Advisories.

See Also

http://www.nessus.org/u?5910065f

https://www.cisa.gov/news-events/ics-advisories/icsa-25-093-01

Plugin Details

Severity: Medium

ID: 503158

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 4/14/2025

Updated: 4/14/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v3

Risk Factor: Medium

Base Score: 4.4

Vector: CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

CVSS v4

Risk Factor: Medium

Base Score: 5.9

Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Vulnerability Information

CPE: cpe:/o:hitachienergy:rtu500_firmware

Required KB Items: Tenable.ot/ABB

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 3/25/2025

Reference Information

CVE: CVE-2024-10037

CWE: 476

ICSA: 25-093-01