Discover the details of CVE-2021-35526, a vulnerability in Hitachi ABB Power Grids System Data Manager – SDM600 allowing unauthorized access to sensitive information. Learn how to mitigate this security risk.
A vulnerability has been identified in Hitachi ABB Power Grids System Data Manager – SDM600 that could allow an attacker to access sensitive information. This CVE affects SDM600 1.2 versions prior to FP2 HF6 (Build Nr. 1.2.14002.257).
Understanding CVE-2021-35526
This section provides insights into the nature and impact of the CVE.
What is CVE-2021-35526?
The vulnerability involves a cleartext storage issue in Hitachi ABB Power Grids System Data Manager – SDM600, potentially granting unauthorized access to critical data.
The Impact of CVE-2021-35526
The vulnerability poses a medium severity threat with low attack complexity, impacting the confidentiality, availability, and integrity of sensitive information.
Technical Details of CVE-2021-35526
This section delves into the specifics of the vulnerability.
Vulnerability Description
The vulnerability stems from an unencrypted backup file, which can be exploited by threat actors seeking unauthorized access to sensitive data.
Affected Systems and Versions
Hitachi ABB Power Grids System Data Manager – SDM600 version 1.2 prior to FP2 HF6 (Build Nr. 1.2.14002.257) is susceptible to this vulnerability.
Exploitation Mechanism
The vulnerability can be exploited locally with low privileges, necessitating the importance of timely security measures.
Mitigation and Prevention
This section outlines steps to mitigate and prevent exploitation of the CVE.
Immediate Steps to Take
It is crucial to apply the latest product version SDM600 1.2 FP2 HF6 and secure any vulnerable backups to prevent unauthorized access to sensitive information.
Long-Term Security Practices
Implement least privilege principles, follow security deployment guidelines, and configure firewall settings to safeguard against external attacks.
Patching and Updates
Customers are urged to apply the update promptly. Following the update, adhere to best practices such as avoiding internet access on the control system and stringent virus checks on portable devices.