{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-4872","assignerOrgId":"e383dce4-0c27-4495-91c4-0db157728d17","state":"PUBLISHED","assignerShortName":"Hitachi Energy","dateReserved":"2024-05-14T14:41:23.177Z","datePublished":"2024-08-27T12:37:28.958Z","dateUpdated":"2025-08-27T21:30:14.068Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"MicroSCADA X SYS600","vendor":"Hitachi Energy","versions":[{"lessThanOrEqual":"10.5","status":"affected","version":"10.0","versionType":"custom"},{"status":"unaffected","version":"10.3 vulnerability patch 2025_01","versionType":"custom"},{"status":"unaffected","version":"10.4 vulnerability patch 2025_01","versionType":"custom"},{"status":"unaffected","version":"10.5 vulnerability patch 2025_01","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"MicroSCADA Pro SYS600","vendor":"Hitachi Energy","versions":[{"lessThanOrEqual":"9.4 FP2 HF5","status":"affected","version":"9.4 FP2 HF1","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to successfully exploit this vulnerability\nan attacker must have a valid credential.\n\n<br>"}],"value":"A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to successfully exploit this vulnerability\nan attacker must have a valid credential."}],"impacts":[{"capecId":"CAPEC-248","descriptions":[{"lang":"en","value":"CAPEC-248 Command Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"MicroSCADA X SYS600"}]},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"MicroSCADA Pro SYS600"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-943","description":"CWE-943 Improper Neutralization of Special Elements in Data Query Logic","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"e383dce4-0c27-4495-91c4-0db157728d17","shortName":"Hitachi Energy","dateUpdated":"2025-04-11T14:01:46.020Z"},"references":[{"tags":["vendor-advisory"],"url":"https://publisher.hitachienergy.com/preview?DocumentID=8DBD000160&LanguageCode=en&DocumentPartId=&Action=Launch"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"hitachienergy","product":"microscada_sys600","cpes":["cpe:2.3:a:hitachienergy:microscada_sys600:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"10.0","status":"affected","lessThanOrEqual":"10.5","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-27T13:40:43.456014Z","id":"CVE-2024-4872","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-27T21:30:14.068Z"}}]}}