Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1773: CWE-184 Incomplete List of Disallowed Inputs in Hitachi Energy RTU500 series CMU firmware

0
High
VulnerabilityCVE-2026-1773cvecve-2026-1773cwe-184
Published: Tue Feb 24 2026 (02/24/2026, 13:13:17 UTC)
Source: CVE Database V5
Vendor/Project: Hitachi Energy
Product: RTU500 series CMU firmware

Description

IEC 60870-5-104: Potential Denial of Service impact on reception of invalid U-format frame. Product is only affected if IEC 60870-5-104 bi-directional functionality is configured. Enabling secure communication following IEC 62351-3 does not remediate the vulnerability but mitigates the risk of exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 18:45:40 UTC

Technical Analysis

CVE-2026-1773 is a vulnerability classified under CWE-184 (Incomplete List of Disallowed Inputs) found in the firmware of Hitachi Energy's RTU500 series Central Management Unit (CMU). The flaw lies in the firmware's handling of IEC 60870-5-104 protocol U-format frames, which are control frames used in supervisory control and data acquisition (SCADA) systems for electric utility automation. Specifically, the firmware does not adequately validate or reject certain malformed or invalid U-format frames, allowing an attacker to send crafted invalid frames that the device cannot properly process. This leads to a denial of service condition, potentially causing the CMU to become unresponsive or disrupt communication. The vulnerability is only exploitable if the IEC 60870-5-104 bi-directional communication feature is enabled on the device. Although enabling IEC 62351-3 secure communication (which provides authentication and encryption for IEC 60870-5-104) reduces the risk of exploitation by restricting unauthorized access, it does not eliminate the underlying input validation flaw. The affected firmware versions range from 12.7.1 to 13.8.1. The CVSS 4.0 vector indicates the attack can be launched remotely over the network without any privileges or user interaction, with a high impact on availability but no impact on confidentiality or integrity. No patches or exploits are currently publicly available, but the vulnerability poses a significant risk to operational continuity in critical infrastructure environments where these devices are deployed.

Potential Impact

The primary impact of CVE-2026-1773 is a denial of service condition on Hitachi Energy RTU500 series CMU devices, which are commonly used in electric utility automation and critical infrastructure SCADA systems. Disruption of these devices can lead to loss of monitoring and control capabilities, potentially causing operational outages, delayed fault detection, or unsafe conditions in power grid management. Since the vulnerability can be exploited remotely without authentication, attackers could disrupt large-scale industrial control systems if the bi-directional IEC 60870-5-104 functionality is enabled and accessible. This could affect grid stability and reliability, leading to financial losses, regulatory penalties, and safety hazards. The lack of known exploits reduces immediate risk, but the high CVSS score and critical role of these devices in infrastructure elevate the threat level. Organizations relying on these devices must consider the risk of service disruption and potential cascading effects on dependent systems.

Mitigation Recommendations

Organizations should first verify whether IEC 60870-5-104 bi-directional communication is enabled on their RTU500 series CMU devices; if not required, disable this feature to eliminate exposure. For systems requiring this functionality, implement IEC 62351-3 secure communication to restrict access and reduce the risk of unauthorized exploitation, although this does not fully fix the vulnerability. Monitor network traffic for anomalous or malformed U-format frames targeting these devices and employ network segmentation and firewall rules to limit exposure of CMUs to untrusted networks. Since no patches are currently available, maintain close contact with Hitachi Energy for firmware updates addressing this issue and plan for timely deployment once released. Additionally, implement robust incident response plans to quickly detect and recover from potential denial of service events. Regularly audit device configurations and update security policies to minimize attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Hitachi Energy
Date Reserved
2026-02-02T16:28:59.394Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699da85ebe58cf853bd63632

Added to database: 2/24/2026, 1:32:14 PM

Last enriched: 3/3/2026, 6:45:40 PM

Last updated: 4/10/2026, 1:02:50 AM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses