Hitachienergy Security Vulnerabilities (CVEs)
Track 20 security vulnerabilities affecting Hitachienergy products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
An authenticated user with Installer role in REB500 can access and modify directories they are not authorized to access. This privilege escalation vul...
Feb 24, 2026This vulnerability affects IEC 60870-5-104 implementations when bi-directional functionality is configured. Attackers can send specially crafted inval...
Feb 24, 2026An authenticated low-privilege user in MicroSCADA X SYS600's Monitor Pro interface can view and overwrite files, leading to information disclosure and...
Jun 24, 2025This vulnerability in MicroSCADA X SYS600's web interface allows attackers to craft malicious filtering queries that bypass authorization controls, po...
Jun 24, 2025A command injection vulnerability in the Edge Computing UI for TRO600 series radios allows attackers with write access to execute arbitrary system com...
Oct 29, 2024This vulnerability is an Open Redirect issue in Hitachi Energy products where an HTTP parameter can be manipulated to redirect users to malicious webs...
Aug 27, 2024CVE-2024-3980 is a path traversal vulnerability in MicroSCADA Pro/X SYS600 that allows authenticated users to manipulate file paths, potentially acces...
Aug 27, 2024A critical vulnerability in MicroSCADA Pro/X SYS600 allows authenticated attackers to inject code into persistent data through query validation flaws....
Aug 27, 2024This vulnerability in FOXMAN-UN/UNEM systems involves sensitive information being stored in cleartext within accessible resources. Attackers with acce...
Jun 11, 2024This vulnerability allows a malicious high-privileged user in FOXMAN-UN/UNEM applications to reuse passwords and login credentials through complex rou...
Jun 11, 2024A stack overflow vulnerability in the HCI Modbus TCP function of Hitachi Energy RTU500 devices allows attackers to cause denial of service by sending ...
Jan 4, 2024A buffer overflow vulnerability in the HCI IEC 60870-5-104 function of RTU500 series products allows remote attackers to cause targeted CMU units to r...
Jul 26, 2023CVE-2022-3686 is a denial-of-service vulnerability in Hitachi Energy SDM600 endpoints where an attacker can render the application unresponsive by sen...
Mar 28, 2023CVE-2022-3683 is an authorization bypass vulnerability in the SDM600 API web services that allows attackers to access sensitive data from insufficient...
Mar 28, 2023CVE-2022-3682 is a file permission validation vulnerability in Hitachi Energy SDM600 that allows authenticated attackers to upload specially crafted m...
Mar 28, 2023A validation error in the HCI Modbus TCP function in RTU500 devices allows attackers to send specially crafted messages causing the receiving RTU500 C...
May 2, 2022This CVE describes a weak password requirements vulnerability in Hitachi Energy FOX61x and XCM20 devices that allows attackers to gain unauthorized ac...
Dec 2, 2021An improper input validation vulnerability in the APDU parser of Hitachi Energy RTU500 series CMU devices allows attackers to send specially crafted I...
Nov 26, 2021This vulnerability allows an attacker with physical access to the front network port to exploit a time gap during device boot where an older vulnerabl...
Nov 18, 2021This CVE describes a password autocomplete vulnerability in Hitachi ABB Power Grids eSOMS web application that allows attackers to access user credent...
Jul 14, 2021Why Monitor Hitachienergy Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 20+ known vulnerabilities affecting Hitachienergy products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Hitachienergy packages in under 60 seconds. No agents required - completely agentless scanning that works across Hitachienergy deployments.
Free vulnerability database: Access detailed information about every Hitachienergy CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Hitachienergy CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions