CVE-2023-1514

HIGH

RTU500 Scripting interface - Info Disclosure

Title source: llm
STIX 2.1

Description

A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.

Exploits (1)

nomisec WORKING POC
by wsx-rootdeef · poc
https://github.com/wsx-rootdeef/CVE-2023-1514-SQL-Injection-Teampass-

References (1)

Core 1

Scores

CVSS v3 7.4
EPSS 0.0007
EPSS Percentile 21.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Details

CWE
CWE-295
Status published
Products (3)
hitachienergy/rtu500_scripting_interface 1.0.1.30
hitachienergy/rtu500_scripting_interface 1.0.2
hitachienergy/rtu500_scripting_interface 1.1.1
Published Dec 19, 2023
Tracked Since Feb 18, 2026