<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>GMS600 Versions 1.3.0 and 1.3.1 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/gms600-versions-1.3.0-and-1.3.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 16:12:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/gms600-versions-1.3.0-and-1.3.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>Hitachi Energy GMS600 Vulnerable to Bleichenbacher Attack via CVE-2022-4304</title><link>https://feed.craftedsignal.io/briefs/2026-05-hitachi-gms600-bleichenbacher/</link><pubDate>Thu, 21 May 2026 16:12:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-hitachi-gms600-bleichenbacher/</guid><description>Hitachi Energy GMS600 versions 1.3.0 and 1.3.1 are affected by CVE-2022-4304, a vulnerability in the OpenSSL RSA Decryption implementation; an attacker could exploit this timing-based side channel to recover plaintext across a network in a Bleichenbacher-style attack by sending trial messages to the server and recording processing times, eventually decrypting application data.</description><content:encoded><![CDATA[<p>Hitachi Energy GMS600 versions 1.3.0 and 1.3.1 are vulnerable to a timing-based side-channel attack (CVE-2022-4304) in the OpenSSL RSA decryption implementation. This vulnerability allows a remote attacker to recover plaintext data by exploiting observable discrepancies in processing times. The attack involves sending a large number of trial messages to the server and recording the time taken to process each one. Successful exploitation could allow an attacker to decrypt sensitive application data transmitted over the network. This vulnerability affects all RSA padding modes, including PKCS#1 v1.5, RSA-OEAP, and RSASVE. Hitachi Energy recommends upgrading to version 1.3.2 to mitigate this vulnerability, which was initially disclosed in June 2023 and updated in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker observes a genuine TLS connection between a client and a server using RSA for key exchange.</li>
<li>Attacker crafts a series of trial messages specifically designed to exploit the timing vulnerability in OpenSSL&rsquo;s RSA decryption implementation.</li>
<li>Attacker sends these trial messages to the GMS600 server.</li>
<li>The GMS600 server processes each trial message, and the attacker records the time taken for each processing attempt.</li>
<li>Attacker analyzes the timing data to identify subtle variations in processing times related to the structure of the encrypted pre-master secret.</li>
<li>After a sufficiently large number of messages, the attacker recovers the pre-master secret used for the original connection.</li>
<li>Attacker decrypts the application data sent over that connection using the recovered pre-master secret.</li>
<li>Attacker gains unauthorized access to sensitive information transmitted between the client and server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2022-4304 allows an attacker to decrypt sensitive data transmitted over the network, potentially compromising critical manufacturing processes controlled by the GMS600. Given the wide deployment of GMS600 in critical infrastructure sectors worldwide, this vulnerability poses a significant risk to operational technology environments. Impact could range from loss of confidentiality to unauthorized control of industrial processes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Hitachi Energy GMS600 to version 1.3.2 to address the vulnerability (CVE-2022-4304).</li>
<li>Implement network segmentation and firewall rules to minimize network exposure of control system devices as described in the &ldquo;General Mitigation Factors&rdquo; section of the advisory.</li>
<li>Enforce ingress IP allowlisting and traffic rate limiting to protect the control network from external attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>bleichenbacher</category><category>timing attack</category><category>openssl</category><category>critical infrastructure</category></item></channel></rss>