Multiple critical vulnerabilities reported in Hitachi Energy Service Suite
Take action: If you are running Hitachi Energy Service Suite make sure running on systems isolated from the internet and accessible only from trusted networks. Then plan a regular patch cycle. Just don't ignore these flaws, plan and execute the patch.
Learn More
Hitachi Energy has released an advisory regarding multiple vulnerabilities - at least three critical - affecting their Service Suite product. These vulnerabilities, primarily associated with the Apache HTTP Server components included in the product, expose affected systems to a variety of remote attacks with low complexity requirements.
Vulnerabilities summary:
- CVE-2022-31813 (CVSS score 9.3): Use of Less Trusted Source - Apache HTTP Server may not send X-Forwarded-* headers to the origin server due to client-side Connection header hop-by-hop mechanism, allowing attackers to bypass IP-based authentication.
- CVE-2023-25690 (CVSS score 9.3): HTTP Request/Response Smuggling - Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow HTTP request smuggling attacks when mod_proxy is enabled with RewriteRule or ProxyPassMatch.
- CVE-2022-36760 (CVSS score 9.2): HTTP Request/Response Smuggling - Vulnerability in mod_proxy_ajp allows attackers to smuggle requests to the AJP server in Apache HTTP Server 2.4.54 and prior.
- CVE-2022-28615 (CVSS score 8.8): Integer Overflow or Wraparound - Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to read beyond bounds in ap_strcmp_match() when provided with extremely large input.
- CVE-2023-27522 (CVSS score 8.7): HTTP Request/Response Smuggling - Special characters in origin response headers can truncate or split responses forwarded to clients in Apache HTTP Server 2.4.30 through 2.4.55.
- CVE-2006-20001 (CVSS score 8.7): Out-of-bounds Write - Carefully crafted If: request headers can cause memory read/write of a single zero byte beyond header value, potentially crashing processes in Apache HTTP Server 2.4.54 and earlier.
- CVE-2022-29404 (CVSS score 8.7): Resource Allocation Without Limits - Malicious requests to Lua scripts calling r:parsebody(0) may cause denial of service due to lack of default input size limits in Apache HTTP Server 2.4.53 and earlier.
- CVE-2022-30556 (CVSS score 8.7): Exposure of Sensitive Information - Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past allocated buffer storage endpoints.
- CVE-2022-30522 (CVSS score 8.7): Memory Allocation with Excessive Size Value - Apache HTTP Server 2.4.53 with mod_sed transformations may make excessively large memory allocations and trigger aborts when input is very large.
- CVE-2022-26377 (CVSS score 8.7): HTTP Request/Response Smuggling - Vulnerability in mod_proxy_ajp allows request smuggling to AJP servers in Apache HTTP Server 2.4.53 and earlier.
- CVE-2023-31122 (CVSS score 8.7): Out-of-bounds Read - Another HTTP request smuggling vulnerability in mod_proxy_ajp affecting Apache HTTP Server 2.4.53 and earlier.
- CVE-2023-43622 (CVSS score 8.7): Uncontrolled Resource Consumption - HTTP/2 connections with initial window size of 0 can block connection handling indefinitely, enabling worker resource exhaustion similar to "slow loris" attacks in Apache HTTP Server 2.4.55 through 2.4.57.
- CVE-2023-45802 (CVSS score 8.2): Improper Resource Shutdown - In HTTP/2 streams, reset requests' memory isn't immediately reclaimed, allowing memory consumption to grow until connections close in Apache HTTP Server 2.4.17 through 2.4.57.
- CVE-2022-37436 (CVSS score 6.9): Improper Neutralization of CRLF Sequences - Malicious backends can cause response headers to be truncated early, incorporating security headers into response bodies in Apache HTTP Server versions prior to 2.4.55.
- CVE-2022-28614 (CVSS score 6.9): Exposure of Sensitive Information - The ap_rwrite() function may read unintended memory if an attacker causes the server to reflect very large input in Apache HTTP Server 2.4.53 and earlier.
- CVE-2022-28330 (CVSS score 6.9): Out-of-bounds Read - Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when processing requests with mod_isapi module.
The affected products include Hitachi Energy Service Suite versions 9.8.1.3 and prior. The vulnerabilities are primarily associated with the Apache HTTP Server component integrated into the Service Suite product, spanning multiple versions from 2.4.17 through 2.4.57 depending on the specific vulnerability.
Hitachi Energy recommends that affected users update to Service Suite version 9.8.1.4.