CVE-2022-2502

7.5 HIGH

📋 TL;DR

A buffer overflow vulnerability in the HCI IEC 60870-5-104 function of RTU500 series products allows remote attackers to cause targeted CMU units to reboot by sending specially crafted messages. This affects RTU500 systems configured with IEC 62351-5 support and the separately licensed 'Advanced security' feature. The vulnerability results from missing input validation in industrial control system components.

💻 Affected Systems

Products:
  • RTU500 series
Versions: Specific affected versions not specified in CVE description
Operating Systems: Embedded/RTOS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when HCI 60870-5-104 is configured with IEC 62351-5 support AND CMU contains the separately licensed 'Advanced security' feature

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Persistent denial-of-service attacks could disrupt critical industrial operations by repeatedly rebooting RTU500 CMU units, potentially causing process interruptions in SCADA/ICS environments.

🟠

Likely Case

Temporary service disruption through CMU reboots, requiring manual intervention to restore normal operations in affected industrial control systems.

🟢

If Mitigated

Limited impact with proper network segmentation and security controls, as the vulnerability requires specific licensed features and configurations to be exploitable.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires knowledge of IEC 60870-5-104 protocol and access to the network where RTU500 is deployed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references

Vendor Advisory: https://publisher.hitachienergy.com/preview?DocumentID=8DBD000121&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Contact Hitachi Energy/ABB for specific patch information 2. Apply vendor-provided firmware updates 3. Restart affected RTU500 CMU units 4. Verify configuration changes

🔧 Temporary Workarounds

Disable vulnerable configuration

all

Remove IEC 62351-5 support from HCI 60870-5-104 configuration if not required

Network segmentation

all

Isolate RTU500 systems in separate network segments with strict access controls

🧯 If You Can't Patch

  • Implement strict network access controls to limit communication to RTU500 systems
  • Deploy intrusion detection systems monitoring for anomalous IEC 60870-5-104 traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check RTU500 configuration for HCI 60870-5-104 with IEC 62351-5 support and verify 'Advanced security' license is present

Check Version:

Vendor-specific commands through RTU500 management interface

Verify Fix Applied:

Verify firmware version against vendor recommendations and confirm IEC 62351-5 configuration is either updated or disabled

📡 Detection & Monitoring

Log Indicators:

  • Unexpected CMU reboots
  • Abnormal IEC 60870-5-104 message patterns
  • Buffer overflow error messages

Network Indicators:

  • Malformed IEC 60870-5-104 packets
  • Unusual traffic patterns to RTU500 ports
  • Multiple connection attempts with crafted messages

SIEM Query:

source="rtu500" AND (event_type="reboot" OR error_message="buffer_overflow")

🔗 References

📤 Share & Export