Risk | Low |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2021-40341 CVE-2021-40342 CVE-2022-3927 CVE-2022-3928 CVE-2022-3929 |
CWE-ID | CWE-326 CWE-310 CWE-321 CWE-319 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
UNEM R9C Other software / Other software solutions UNEM R10C Other software / Other software solutions UNEM R11A Other software / Other software solutions UNEM R11B Other software / Other software solutions UNEM R14A Other software / Other software solutions UNEM R14B Other software / Other software solutions UNEM R15A Other software / Other software solutions UNEM R15B Other software / Other software solutions UNEM R16A Other software / Other software solutions |
Vendor | Hitachi Energy |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU70765
Risk: Low
CVSSv4.0: 4.6 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-40341
CWE-ID:
CWE-326 - Inadequate Encryption Strength
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to inadequate encryption strength within the DES cypher. A local attacker can decrypt the cypher in a short time.
MitigationInstall update from vendor's website.
Vulnerable software versionsUNEM R9C: All versions
UNEM R10C: All versions
UNEM R11A: All versions
UNEM R11B: All versions
UNEM R14A: All versions
UNEM R14B: All versions
UNEM R15A: All versions
UNEM R15B: All versions
UNEM R16A: All versions
CPE2.3https://ics-cert.us-cert.gov/advisories/icsa-23-005-01
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70767
Risk: Low
CVSSv4.0: 4.6 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-40342
CWE-ID:
CWE-310 - Cryptographic Issues
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to the affected products use a DES implementation with a default key for encryption. A local attacker can obtain sensitive information and gain access to network elements managed by the FOXMAN-UN.
MitigationInstall update from vendor's website.
Vulnerable software versionsUNEM R9C: All versions
UNEM R10C: All versions
UNEM R11A: All versions
UNEM R11B: All versions
UNEM R14A: All versions
UNEM R14B: All versions
UNEM R15A: All versions
UNEM R15B: All versions
UNEM R16A: All versions
CPE2.3https://ics-cert.us-cert.gov/advisories/icsa-23-005-01
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70768
Risk: Low
CVSSv4.0: 1.4 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:U/U:Clear]
CVE-ID: CVE-2022-3927
CWE-ID:
CWE-321 - Use of Hard-coded Cryptographic Key
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to the affected products contain public and private keys used to sign and protect custom parameter set (CPS) files from modification. A remote administrator can change the CPS file and sign it, so it is trusted as a legitimate CPS file.
MitigationInstall update from vendor's website.
Vulnerable software versionsUNEM R9C: All versions
UNEM R10C: All versions
UNEM R11A: All versions
UNEM R11B: All versions
UNEM R14A: All versions
UNEM R14B: All versions
UNEM R15A: All versions
UNEM R15B: All versions
UNEM R16A: All versions
CPE2.3https://ics-cert.us-cert.gov/advisories/icsa-23-005-01
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70769
Risk: Low
CVSSv4.0: 4.6 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3928
CWE-ID:
CWE-321 - Use of Hard-coded Cryptographic Key
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to the message queue contains a hard-coded credential. A local attacker can access data from the internal message queue.
MitigationInstall update from vendor's website.
Vulnerable software versionsUNEM R9C: All versions
UNEM R10C: All versions
UNEM R11A: All versions
UNEM R11B: All versions
UNEM R14A: All versions
UNEM R14B: All versions
UNEM R15A: All versions
UNEM R15B: All versions
UNEM R16A: All versions
CPE2.3https://ics-cert.us-cert.gov/advisories/icsa-23-005-01
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70770
Risk: Low
CVSSv4.0: 2.3 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-3929
CWE-ID:
CWE-319 - Cleartext Transmission of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to software uses common object request broker architecture CORBA (CORBA) to transmit sensitive information. A remote attacker with ability to intercept network traffic can gain trace internal messages.
MitigationInstall update from vendor's website.
Vulnerable software versionsUNEM R9C: All versions
UNEM R10C: All versions
UNEM R11A: All versions
UNEM R11B: All versions
UNEM R14A: All versions
UNEM R14B: All versions
UNEM R15A: All versions
UNEM R15B: All versions
UNEM R16A: All versions
CPE2.3https://ics-cert.us-cert.gov/advisories/icsa-23-005-01
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000084
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.