Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-22278 |
CWE-ID | CWE-295 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
PCM600 Update Manager Other software / Other software solutions |
Vendor | Hitachi Energy |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU58499
Risk: Low
CVSSv4.0: 2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-22278
CWE-ID:
CWE-295 - Improper Certificate Validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to compromise the target system.
The vulnerability exists due to improper certificate validation. A local user can create software packages, sign those packages with specially crafted certificates and point the PCM600 update server location to a different location.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPCM600 Update Manager: 2.1 - 2.4.20119.2
CPE2.3https://search.abb.com/library/Download.aspx?DocumentID=2NGA001142&LanguageCode=en&DocumentPartId=&Action=Launch
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000056&LanguageCode=en&DocumentPartId=&Action=Launch
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.