Skip to content
  Thursday 22 May 2025
Trending
September 12, 2023Senior Cybersecurity Metrics Analyst February 5, 2025The importance of self-care cannot be overstated in today’s fast-paced world. Taking the time to prioritize your own well-being and mental health is crucial for maintaining a balanced and fulfilling life. Self-care can take many forms, from exercise and healthy eating to mindfulness practices and setting boundaries in relationships. It is essential to find what works best for you and make self-care a non-negotiable part of your routine.<br /> <br /> One of the key benefits of self-care is its ability to reduce stress and prevent burnout. By taking the time to relax and recharge, you are better equipped to handle life’s challenges and prevent mental and physical exhaustion. This can lead to increased productivity, better decision-making, and overall improved quality of life.<br /> <br /> Self-care is also important for maintaining healthy relationships with others. When you are taking care of yourself, you are better able to show up for loved ones and be present in your interactions. By prioritizing your own needs, you are setting a positive example for those around you and creating a healthier dynamic in your relationships.<br /> <br /> In addition to its immediate benefits, self-care can also have long-term effects on your overall well-being. By consistently practicing self-care, you are investing in your future health and happiness. This can lead to a greater sense of fulfillment and purpose in life, as well as a deeper connection to yourself and others.<br /> <br /> Ultimately, self-care is a personal journey that looks different for everyone. It is important to listen to your own needs and desires and make self-care a priority in your life. By taking care of yourself, you are better able to show up for others and lead a more fulfilling and balanced life. April 10, 2024New Study Reveals Russia as Global Leader in Cybercrime February 26, 2025Sr. Cybersecurity Project Manager November 14, 2024Rockwell Automation Verve Asset Manager May 5, 2025Cybersecurity Senior Engineer (Customer Cyber Threat Response) December 12, 2024<h3>Emerging Threat: New Malware Framework Targets Cleo File Systems<br /></h3> <p><br /> In a concerning development for cybersecurity experts, a novel malware framework has been discovered targeting Cleo file systems. This sophisticated framework poses a significant threat, as it is designed to exploit vulnerabilities within these systems, potentially compromising sensitive data and disrupting operations. As Cleo file systems are widely used in various industries for secure data exchange, the implications of this malware could be far-reaching.<br /> <br /> The malware, which has yet to be named, operates by infiltrating Cleo file systems through a series of complex techniques. Once inside, it can manipulate file transfers, exfiltrate confidential data, and even introduce further malicious code into the network. This level of infiltration highlights the evolving strategies of cybercriminals who are increasingly targeting specific systems known for handling large volumes of sensitive information. <br /> <br /> Experts emphasize the importance of updating security protocols and ensuring that all systems using Cleo file configurations are fortified against such threats. Organizations are urged to conduct thorough security audits and implement advanced monitoring solutions to detect any unusual activities indicative of a breach. As attackers continue to innovate, staying ahead in cybersecurity measures is paramount.<br /> <br /> Currently, cybersecurity firms are collaborating to analyze the malware’s structure and develop effective countermeasures. This collaboration underscores the necessity of shared intelligence and resources in combating threats that can impact multiple sectors. The collective effort aims not only to mitigate the current threat but also to anticipate and neutralize future variants of the malware.<br /> <br /> The emergence of this malware framework serves as a stark reminder of the ongoing challenges in the cybersecurity landscape. As organizations strive to protect their data, staying informed and proactive is crucial. The battle against cyber threats is relentless, and vigilance, coupled with cutting-edge security practices, remains the best defense.</p> December 8, 2023Review of Microsoft’s Interest in OpenAI by UK Market Regulator November 19, 2024<h3>Brace Yourself: Data Management Audits Arrive in 2025!</h3> January 20, 2024Deployment of WasabiSeed & Screenshotter Malware by TA866
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  Hitachi Energy MicroSCADA System Data Manager SDM600
Threat Advisories

Hitachi Energy MicroSCADA System Data Manager SDM600

Mister CybersecurityMister Cybersecurity—April 6, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


1. EXECUTIVE SUMMARY

  • CVSS v3 9.9 
  • ATTENTION: Exploitable remotely/low attack complexity 
  • Vendor: Hitachi Energy 
  • Equipment: MicroSCADA System Data Manager SDM600 
  • Vulnerabilities: Unrestricted Upload of File with Dangerous Type, Improper Authorization, Improper Resource Shutdown or Release, Improper Privilege Management 

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow an attacker to take remote control of the product. 

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Hitachi Energy’s MicroSCADA SDM600, a data management tool, are affected: 

  • SDM600: Versions prior to v1.2 FP3 HF4 (Build Nr. 1.2.23000.291) 
  • SDM600: Versions prior to v1.3.0 (Build Nr. 1.3.0.1339) 

3.2 VULNERABILITY OVERVIEW

3.2.1 UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434 

A vulnerability exists in the affected SDM600 versions file permission validation. An attacker could exploit the vulnerability by gaining access to the system and uploading a specially crafted message to the system node, which could result in arbitrary code execution. 

CVE-2022-3682 has been assigned to this vulnerability. A CVSS v3 base score of 9.9 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). 

3.2.2 IMPROPER AUTHORIZATION CWE-285 

A vulnerability exists in the affected SDM600 versions application programmable interface (API) web services authorization validation implementation. An attacker successfully exploiting the vulnerability could read sensitive data directly from an insufficiently protected or restricted data store.

CVE-2022-3683 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N). 

3.2.3 IMPROPER RESOURCE SHUTDOWN OR RELEASE CWE-404 

A vulnerability exists in an SDM600 endpoint. An attacker could exploit this vulnerability by running multiple parallel requests, causing the SDM600 web services to become busy, rendering the application unresponsive. 

CVE-2022-3684 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 

More stories

Hitachi Energy UNEM/ECST | CISA

March 5, 2025

CISA Releases Five Industrial Control Systems Advisories

June 1, 2023

CISA Adds Two Known Exploited Vulnerabilities to Catalog

February 19, 2025

APsystems Energy Communication Unit (ECU-C) Power Control Software

January 23, 2024

3.2.4 IMPROPER PRIVILEGE MANAGEMENT CWE-269 

A vulnerability exists in the affected SDM600 versions software. The software operates at a privilege level higher than the minimum level required. An attacker successfully exploiting this vulnerability could escalate privileges. 

CVE-2022-3685 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). 

3.2.5 IMPROPER AUTHORIZATION CWE-285 

A vulnerability exists in the affected SDM600 versions API permission check mechanism. Successful exploitation could cause an unauthenticated user to gain access to device data, causing confidentiality and integrity issues. 

CVE-2022-3686 has been assigned to this vulnerability. A CVSS v3 base score of 4.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L). 

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Energy 
  • COUNTRIES/AREAS DEPLOYED: Worldwide 
  • COMPANY HEADQUARTERS LOCATION: Switzerland 

3.4 RESEARCHER

Hitachi Energy reported these vulnerabilities to CISA. 

4. MITIGATIONS

Hitachi Energy recommends applying the following mitigations: 

  • All SDM600 versions prior to v1.2 FP3 HF4 (Build Nr. 1.2.23000.291): Update to v1.3.0.1339 
  • SDM600 versions prior to v1.3.0 (Build Nr. 1.3.0.1339): Apply workaround detailed below. 

Hitachi Energy recommends the following security practices and firewall configurations to help protect a process control network from attacks originating from outside the network:  

  • Practice principles of least privileges to minimize permissions and accesses to SDM600 related resources. 
  • Follow security practices defined in SDM600 security deployment guidelines. 
  • Physically protect process control systems from unauthorized direct access.  
  • Do not directly connect control systems networks to the internet.  
  • Separate process control systems from other networks using a firewall system with a minimal number of open ports.  
  • Process control systems should not be used for internet surfing, instant messaging, or receiving emails.  
  • Portable computers and removable storage media should be carefully scanned for viruses prior connection to a control system.  

For more information, see Hitachi security advisory 8DBD000138. 

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploits specifically target these vulnerabilities. 



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

Cybersecurity Update April 5th 2023: Ransomware Speed Demons, Tax Malware & More!
JTEKT ELECTRONICS Screen Creator Advance 2
Related posts
  • Related posts
  • More from author
Threat Advisories

Threat Actors Target U.S. Critical Infrastructure with LummaC2 Malware

May 21, 20250
Threat Advisories

Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations

May 21, 20250
Threat Advisories

Russian GRU Targeting Western Logistics Entities and Technology Companies

May 21, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Engineer (Top Secret Clearance Required)

May 22, 20250
Careers

Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

May 22, 20250
Careers

Cybersecurity Architect

May 22, 20250
Careers

Cybersecurity Engineer III – Application Security

May 22, 20250
Careers

Cybersecurity Engineer

May 22, 20250
Careers

Cloud Cybersecurity & Automation Engineer

May 22, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Engineer (Top Secret Clearance Required)
  • Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)
  • Cybersecurity Architect
  • Cybersecurity Engineer III – Application Security
  • Cybersecurity Engineer

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures