Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1772: CWE-280 Improper Handling of Insufficient Permissions or Privileges in Hitachi Energy RTU500 series CMU firmware

0
Medium
VulnerabilityCVE-2026-1772cvecve-2026-1772cwe-280
Published: Tue Feb 24 2026 (02/24/2026, 13:03:23 UTC)
Source: CVE Database V5
Vendor/Project: Hitachi Energy
Product: RTU500 series CMU firmware

Description

RTU500 web interface: An unprivileged user can read user management information. The information cannot be accessed via the RTU500 web user interface but requires further tools like browser development utilities to access them without required privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 18:45:25 UTC

Technical Analysis

CVE-2026-1772 identifies a vulnerability in the Hitachi Energy RTU500 series CMU firmware, specifically related to improper handling of insufficient permissions (CWE-280). The RTU500 devices provide a web interface for management, which is designed to restrict access to sensitive user management information to privileged users only. However, due to flawed permission enforcement, an unprivileged user can bypass these restrictions by leveraging browser development tools to access user management data that is not normally exposed via the web interface. This vulnerability affects firmware versions 12.7.1, 13.5.1, 13.6.1, 13.7.1, and 13.8.1. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and limited confidentiality impact (VC:L). The flaw does not impact integrity or availability. No authentication or user interaction is needed, making exploitation feasible for any network-connected attacker with access to the device’s web interface. No patches or known exploits have been reported at the time of publication, but the exposure of user management information could facilitate further attacks such as privilege escalation or unauthorized access. The vulnerability is significant in environments where RTU500 devices are deployed, particularly in critical infrastructure sectors like energy and utilities, where these devices monitor and control operational technology systems.

Potential Impact

The primary impact of CVE-2026-1772 is the unauthorized disclosure of user management information, which compromises confidentiality. This information could include usernames, roles, or other sensitive configuration details that an attacker could leverage to plan further attacks, such as privilege escalation or lateral movement within the network. Although the vulnerability does not directly affect system integrity or availability, the exposure of sensitive data in critical infrastructure environments could lead to increased risk of operational disruption or sabotage if combined with other vulnerabilities or attack vectors. Organizations worldwide using Hitachi Energy RTU500 devices in energy, utilities, or industrial control systems face potential risks, especially if these devices are accessible from less secure network segments. The medium severity rating reflects that while exploitation is relatively straightforward, the scope of impact is limited to information disclosure without immediate control over device functions.

Mitigation Recommendations

To mitigate CVE-2026-1772, organizations should first verify if their RTU500 devices run affected firmware versions (12.7.1, 13.5.1, 13.6.1, 13.7.1, 13.8.1) and monitor vendor communications for patches or firmware updates addressing this issue. In the absence of an official patch, network segmentation should be enforced to restrict access to the RTU500 web interface only to trusted and authenticated users within secure network zones. Implement strict access control lists (ACLs) and firewall rules to limit exposure of the device management interface. Additionally, disable or restrict browser developer tools usage on management workstations where feasible, and conduct regular audits of user permissions and device configurations to detect anomalous access attempts. Employ network monitoring and intrusion detection systems to identify suspicious activities targeting the RTU500 devices. Finally, educate operational technology personnel about this vulnerability and encourage prompt reporting of any unusual behavior related to device management interfaces.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Hitachi Energy
Date Reserved
2026-02-02T16:28:53.742Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699da85ebe58cf853bd6362f

Added to database: 2/24/2026, 1:32:14 PM

Last enriched: 3/3/2026, 6:45:25 PM

Last updated: 4/10/2026, 4:04:11 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses