CVE-2022-2513: CWE-312 Cleartext Storage of Sensitive Information in Hitachi Energy PCM600
A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy’s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database and logs files. An attacker having get access to the exported backup file can exploit the vulnerability and obtain user credentials of the IEDs. Additionally, an attacker with administrator access to the PCM600 host machine can obtain other user credentials by analyzing database log files. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs.
AI Analysis
Technical Summary
CVE-2022-2513 is a high-severity vulnerability affecting Hitachi Energy's PCM600 product, specifically version 2.6. PCM600 is a software tool used for configuring and managing Intelligent Electronic Devices (IEDs) commonly deployed in electrical substations and critical energy infrastructure. The vulnerability arises from the cleartext storage of sensitive IED credentials within the PCM600 database and log files. This improper handling of credentials corresponds to CWE-312, which concerns cleartext storage of sensitive information. An attacker who gains access to an exported backup file of PCM600 can extract the IED credentials without needing any authentication or user interaction. Furthermore, an attacker with administrator-level access to the PCM600 host machine can analyze database log files to retrieve additional user credentials. These credentials can then be leveraged to perform unauthorized actions on the IEDs, such as loading malicious or incorrect configurations, rebooting devices, or causing denial-of-service conditions. The CVSS 3.1 base score is 7.1, indicating a high severity level, with an attack vector of local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact is primarily on confidentiality (C:H), with no direct impact on integrity or availability according to the CVSS vector, though the described potential actions on IEDs imply possible indirect impacts on availability and integrity. No known exploits in the wild have been reported to date, and no patches are currently linked, indicating that mitigation may rely on access control and operational security measures until a fix is available. The vulnerability is critical in environments where PCM600 is used to manage vital energy infrastructure, as compromised credentials could lead to operational disruptions or safety hazards.
Potential Impact
For European organizations, particularly those operating electrical substations and critical energy infrastructure, this vulnerability poses a significant risk. Hitachi Energy's PCM600 is widely used in the power sector across Europe for managing IEDs that control protection, automation, and monitoring functions. Unauthorized access to IED credentials could allow attackers to manipulate device configurations, potentially leading to incorrect protection settings, unintended device reboots, or denial-of-service conditions. Such disruptions can cause power outages, damage to equipment, or safety incidents affecting grid stability and reliability. The confidentiality breach of credentials also raises concerns about insider threats or lateral movement within networks if attackers escalate privileges. Given the strategic importance of energy infrastructure in Europe, exploitation could have cascading effects on other critical sectors dependent on stable power supply. The local attack vector means that attackers need some level of access to the PCM600 host or exported backup files, which may be obtained through insider threats, compromised administrative accounts, or insufficiently secured backup storage. The lack of user interaction required increases the risk once access is gained. Overall, the vulnerability could undermine operational integrity and availability of energy systems, with potential economic and safety consequences.
Mitigation Recommendations
1. Restrict access to PCM600 host machines strictly to authorized personnel only, enforcing strong authentication and role-based access controls to minimize risk of local compromise. 2. Secure backup files containing PCM600 data by encrypting them at rest and in transit, and limit access to these backups to trusted administrators. 3. Implement strict monitoring and auditing of access to PCM600 systems and backup files to detect unauthorized access attempts promptly. 4. Use host-based security controls such as disk encryption and endpoint detection and response (EDR) solutions to prevent unauthorized local access or credential harvesting. 5. Regularly review and rotate IED credentials and administrative passwords to limit exposure time if credentials are compromised. 6. Isolate PCM600 management systems from broader corporate networks using network segmentation and firewalls to reduce attack surface. 7. Until an official patch is released, consider deploying compensating controls such as application whitelisting and restricting export functionality to trusted users only. 8. Educate operational technology (OT) staff about the risks of exporting backup files and the importance of secure handling of sensitive data. 9. Engage with Hitachi Energy support channels to obtain updates on patches or mitigations and plan timely deployment once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Sweden, Norway, Finland, Netherlands, Poland
CVE-2022-2513: CWE-312 Cleartext Storage of Sensitive Information in Hitachi Energy PCM600
Description
A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy’s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database and logs files. An attacker having get access to the exported backup file can exploit the vulnerability and obtain user credentials of the IEDs. Additionally, an attacker with administrator access to the PCM600 host machine can obtain other user credentials by analyzing database log files. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs.
AI-Powered Analysis
Technical Analysis
CVE-2022-2513 is a high-severity vulnerability affecting Hitachi Energy's PCM600 product, specifically version 2.6. PCM600 is a software tool used for configuring and managing Intelligent Electronic Devices (IEDs) commonly deployed in electrical substations and critical energy infrastructure. The vulnerability arises from the cleartext storage of sensitive IED credentials within the PCM600 database and log files. This improper handling of credentials corresponds to CWE-312, which concerns cleartext storage of sensitive information. An attacker who gains access to an exported backup file of PCM600 can extract the IED credentials without needing any authentication or user interaction. Furthermore, an attacker with administrator-level access to the PCM600 host machine can analyze database log files to retrieve additional user credentials. These credentials can then be leveraged to perform unauthorized actions on the IEDs, such as loading malicious or incorrect configurations, rebooting devices, or causing denial-of-service conditions. The CVSS 3.1 base score is 7.1, indicating a high severity level, with an attack vector of local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact is primarily on confidentiality (C:H), with no direct impact on integrity or availability according to the CVSS vector, though the described potential actions on IEDs imply possible indirect impacts on availability and integrity. No known exploits in the wild have been reported to date, and no patches are currently linked, indicating that mitigation may rely on access control and operational security measures until a fix is available. The vulnerability is critical in environments where PCM600 is used to manage vital energy infrastructure, as compromised credentials could lead to operational disruptions or safety hazards.
Potential Impact
For European organizations, particularly those operating electrical substations and critical energy infrastructure, this vulnerability poses a significant risk. Hitachi Energy's PCM600 is widely used in the power sector across Europe for managing IEDs that control protection, automation, and monitoring functions. Unauthorized access to IED credentials could allow attackers to manipulate device configurations, potentially leading to incorrect protection settings, unintended device reboots, or denial-of-service conditions. Such disruptions can cause power outages, damage to equipment, or safety incidents affecting grid stability and reliability. The confidentiality breach of credentials also raises concerns about insider threats or lateral movement within networks if attackers escalate privileges. Given the strategic importance of energy infrastructure in Europe, exploitation could have cascading effects on other critical sectors dependent on stable power supply. The local attack vector means that attackers need some level of access to the PCM600 host or exported backup files, which may be obtained through insider threats, compromised administrative accounts, or insufficiently secured backup storage. The lack of user interaction required increases the risk once access is gained. Overall, the vulnerability could undermine operational integrity and availability of energy systems, with potential economic and safety consequences.
Mitigation Recommendations
1. Restrict access to PCM600 host machines strictly to authorized personnel only, enforcing strong authentication and role-based access controls to minimize risk of local compromise. 2. Secure backup files containing PCM600 data by encrypting them at rest and in transit, and limit access to these backups to trusted administrators. 3. Implement strict monitoring and auditing of access to PCM600 systems and backup files to detect unauthorized access attempts promptly. 4. Use host-based security controls such as disk encryption and endpoint detection and response (EDR) solutions to prevent unauthorized local access or credential harvesting. 5. Regularly review and rotate IED credentials and administrative passwords to limit exposure time if credentials are compromised. 6. Isolate PCM600 management systems from broader corporate networks using network segmentation and firewalls to reduce attack surface. 7. Until an official patch is released, consider deploying compensating controls such as application whitelisting and restricting export functionality to trusted users only. 8. Educate operational technology (OT) staff about the risks of exporting backup files and the importance of secure handling of sensitive data. 9. Engage with Hitachi Energy support channels to obtain updates on patches or mitigations and plan timely deployment once available.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Hitachi Energy
- Date Reserved
- 2022-07-22T13:30:13.171Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbed07a
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 6/25/2025, 5:07:38 PM
Last updated: 2/7/2026, 7:15:30 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.