
[CIVN-2026-0142] Radius MD5 Vulnerability in Hitachi Energy XMC20 product
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Radius MD5 Vulnerability in Hitachi Energy XMC20 product
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Systems Affected
XMC20 version R18
XMC20 version R17A and prior
Overview
A vulnerability in RADIUS protocol affects Hitachi Energy XMC20 series of industrial telecommunication network elements. This vulnerability can be exploited by an unauthenticated attacker to perform forgery attacks thereby impacting confidentiality, integrity and availability for the System.
Target Audience:
Organizations using Hitachi Electric¿s XMC20 series of network elements for industrial telecommunication.
Risk Assessment:
High risk of data disclosure, alteration and service disruption.
Impact Assessment:
Potential High impact on Confidentiality, Integrity and Availability of the System.
Description
XMC20 series of products are multi-service telecommunication network elements designed for mission-critical access and transport networks in industrial environments.
Vulnerability exists in the RADIUS protocol due to improper validation of integrity checks and enforcement of message integrity during transmission.
An unauthenticated attacker could exploit this vulnerability by modifying valid RADIUS authentication responses to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature leading to unauthorized access, data disclosure, data alteration or service disruption on affected devices.
Workaround
Hitachi Electric recommends to follow the General Mitigations/ Workarounds available at:
https://publisher.hitachienergy.com/preview?DocumentID=8DBD000233&LanguageCode=en
Solution
Upgrade the affected product to the version R18 and enable RADIUS Message-Authenticator option in the RADIUS configuration of XMC20 and the RADIUS Server.
Vendor Information
Hitachi Energy
https://publisher.hitachienergy.com/preview?DocumentID=8DBD000233&LanguageCode=en
References
Hitachi Energy
https://publisher.hitachienergy.com/preview?DocumentID=8DBD000233&LanguageCode=en
CISA
https://www.cisa.gov/news-events/ics-advisories/icsa-26-036-05
CVE Name
CVE-2024-3596
– – – —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
– —–BEGIN PGP SIGNATURE—–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=ofkm
– —–END PGP SIGNATURE—–
—–BEGIN PGP SIGNATURE—–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=PZz8
—–END PGP SIGNATURE—–


