ID

VAR-202208-1719


CVE

CVE-2022-2081


TITLE

Hitachi Energy  Made  RTU500 series  Stack-based buffer overflow vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-002340

DESCRIPTION

A vulnerability exists in the HCI Modbus TCP function included in the product versions listed above. If the HCI Modbus TCP is enabled and configured, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500 in a high rate, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a lack of flood control which eventually if exploited causes an internal stack overflow in the HCI Modbus TCP function. Hitachi Energy Provided by RTU500 series The following vulnerabilities exist in. RTU500 is a series of industrial control components of Hitachi, Japan, mainly used in industrial control systems. The vulnerability stems from enabling and configuring HCI Modbus TCP. Hitachi Energy RTU500

Trust: 2.25

sources: NVD: CVE-2022-2081 // JVNDB: JVNDB-2022-002340 // CNVD: CNVD-2025-02742 // VULMON: CVE-2022-2081

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-02742

AFFECTED PRODUCTS

vendor:hitachienergymodel:rtu520scope:gteversion:12.7.1

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:gteversion:13.2.1

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:lteversion:13.2.4

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:gteversion:12.4.1

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:lteversion:13.2.4

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:lteversion:13.2.4

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:gteversion:12.4.1

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:gteversion:12.2.1

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:eqversion:13.3.1

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:lteversion:12.6.7

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:lteversion:12.6.7

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:lteversion:12.2.11

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:lteversion:12.6.7

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:gteversion:12.0.1

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:lteversion:12.7.3

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:lteversion:12.4.11

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:lteversion:12.7.3

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:lteversion:12.0.13

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:lteversion:12.0.13

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:lteversion:12.7.3

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:lteversion:12.4.11

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:lteversion:12.0.13

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:gteversion:12.2.1

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:gteversion:12.7.1

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:lteversion:12.4.11

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:gteversion:12.6.1

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:gteversion:12.2.1

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:gteversion:13.2.1

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:gteversion:12.6.1

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:gteversion:12.7.1

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:gteversion:12.6.1

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:gteversion:13.2.1

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:eqversion:13.3.1

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:lteversion:13.2.4

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:gteversion:12.4.1

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:eqversion:13.3.1

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:gteversion:12.7.1

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:gteversion:13.2.1

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:eqversion:13.3.1

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:gteversion:12.0.1

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:lteversion:12.6.7

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:lteversion:12.4.11

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:lteversion:12.7.3

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:lteversion:12.0.13

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:lteversion:12.2.11

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:lteversion:12.2.11

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:gteversion:12.2.1

Trust: 1.0

vendor:hitachienergymodel:rtu540scope:gteversion:12.0.1

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:gteversion:12.0.1

Trust: 1.0

vendor:hitachienergymodel:rtu560scope:lteversion:12.2.11

Trust: 1.0

vendor:hitachienergymodel:rtu520scope:gteversion:12.6.1

Trust: 1.0

vendor:hitachienergymodel:rtu530scope:gteversion:12.4.1

Trust: 1.0

vendor:hitachi energymodel:rtu540scope: - version: -

Trust: 0.8

vendor:hitachi energymodel:rtu560scope: - version: -

Trust: 0.8

vendor:hitachi energymodel:rtu530scope: - version: -

Trust: 0.8

vendor:hitachi energymodel:rtu520scope: - version: -

Trust: 0.8

vendor:hitachimodel:energy rtu500 series cmuscope:gteversion:12.0.1.0,<=12.0.14.0

Trust: 0.6

vendor:hitachimodel:energy rtu500 series cmuscope:gteversion:12.2.1.0,<=12.2.11.0

Trust: 0.6

vendor:hitachimodel:energy rtu500 series cmuscope:gteversion:12.4.1.0,<=12.4.11.0

Trust: 0.6

vendor:hitachimodel:energy rtu500 series cmuscope:gteversion:12.6.1.0,<=12.6.7.0

Trust: 0.6

vendor:hitachimodel:energy rtu500 series cmuscope:gteversion:12.7.1.0,<=12.7.3.0

Trust: 0.6

vendor:hitachimodel:energy rtu500 series cmuscope:gteversion:13.2.1.0,<=13.2.4.0

Trust: 0.6

vendor:hitachimodel:energy rtu500 series cmuscope:eqversion:13.3.1.0

Trust: 0.6

sources: CNVD: CNVD-2025-02742 // JVNDB: JVNDB-2022-002340 // NVD: CVE-2022-2081

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-2081
value: HIGH

Trust: 1.0

cybersecurity@hitachienergy.com: CVE-2022-2081
value: HIGH

Trust: 1.0

NVD: CVE-2022-2081
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-02742
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202208-3793
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-02742
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2022-2081
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2022-2081
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-02742 // JVNDB: JVNDB-2022-002340 // CNNVD: CNNVD-202208-3793 // NVD: CVE-2022-2081 // NVD: CVE-2022-2081

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-002340 // NVD: CVE-2022-2081

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202208-3793

PATCH

title:Modbus File Write Vulnerability in Hitachi Energy ’ s RTU500 series Product CVE-2022-2081 (( PDF)url:https://search.abb.com/library/Download.aspx?DocumentID=8DBD000111&LanguageCode=en&DocumentPartId=&Action=Launch

Trust: 0.8

title:Patch for Hitachi Energy RTU500 series CMU firmware buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/654836

Trust: 0.6

title:Hitachi Energy RTU500 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=205284

Trust: 0.6

sources: CNVD: CNVD-2025-02742 // JVNDB: JVNDB-2022-002340 // CNNVD: CNNVD-202208-3793

EXTERNAL IDS

db:NVDid:CVE-2022-2081

Trust: 3.9

db:ICS CERTid:ICSA-22-235-07

Trust: 2.1

db:JVNid:JVNVU95882646

Trust: 0.8

db:JVNDBid:JVNDB-2022-002340

Trust: 0.8

db:CNVDid:CNVD-2025-02742

Trust: 0.6

db:CNNVDid:CNNVD-202208-3793

Trust: 0.6

db:VULMONid:CVE-2022-2081

Trust: 0.1

sources: CNVD: CNVD-2025-02742 // VULMON: CVE-2022-2081 // JVNDB: JVNDB-2022-002340 // CNNVD: CNNVD-202208-3793 // NVD: CVE-2022-2081

REFERENCES

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-235-07

Trust: 1.2

url:https://publisher.hitachienergy.com/preview?documentid=8dbd000111&languagecode=en&documentpartid=&action=launch

Trust: 1.0

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-235-07

Trust: 0.9

url:http://jvn.jp/vu/jvnvu95882646/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-2081

Trust: 0.8

sources: CNVD: CNVD-2025-02742 // VULMON: CVE-2022-2081 // JVNDB: JVNDB-2022-002340 // CNNVD: CNNVD-202208-3793 // NVD: CVE-2022-2081

CREDITS

Hitachi Energy reported this vulnerability to CISA.

Trust: 0.6

sources: CNNVD: CNNVD-202208-3793

SOURCES

db:CNVDid:CNVD-2025-02742
db:VULMONid:CVE-2022-2081
db:JVNDBid:JVNDB-2022-002340
db:CNNVDid:CNNVD-202208-3793
db:NVDid:CVE-2022-2081

LAST UPDATE DATE

2025-02-14T23:00:37.175000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-02742date:2025-02-12T00:00:00
db:JVNDBid:JVNDB-2022-002340date:2024-04-30T08:51:00
db:CNNVDid:CNNVD-202208-3793date:2022-08-29T00:00:00
db:NVDid:CVE-2022-2081date:2024-09-25T01:15:32.237

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-02742date:2025-02-13T00:00:00
db:JVNDBid:JVNDB-2022-002340date:2022-08-26T00:00:00
db:CNNVDid:CNNVD-202208-3793date:2022-08-23T00:00:00
db:NVDid:CVE-2022-2081date:2024-01-04T10:15:10.927