PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-3596 Hitachi Energy CVE debrief

CVE-2024-3596 is a critical RADIUS forgery issue affecting Hitachi Energy XMC20. The advisory says a valid RADIUS response under RFC 2865 can be transformed into another response type by a chosen-prefix collision attack against the MD5 Response Authenticator signature. Hitachi Energy and CISA recommend enabling the RADIUS Message-Authenticator option on both the XMC20 and the RADIUS server, and updating to XMC20 R18 where possible.

Vendor
Hitachi Energy
Product
XMC20
CVSS
CRITICAL 9
CISA KEV
Not listed in stored evidence
Original CVE published
2026-01-27
Original CVE updated
2026-02-05
Advisory published
2026-01-27
Advisory updated
2026-02-05

Who should care

Hitachi Energy XMC20 operators, OT/ICS security teams, RADIUS administrators, and responders responsible for protecting industrial control management traffic should treat this as high priority, especially where authentication traffic crosses network boundaries.

Technical summary

The source advisory describes a forgery condition in RADIUS as implemented for XMC20. Because the Response Authenticator relies on MD5, an attacker can use a chosen-prefix collision attack to convert a valid Access-Accept, Access-Reject, or Access-Challenge into a different response. The CSAF remediation notes specifically call for enabling the RADIUS Message-Authenticator option on both ends and upgrading to XMC20 R18.

Defensive priority

Critical. Prioritize patching and RADIUS hardening for any XMC20 deployment that relies on this authentication path, then reduce exposure with segmentation and ICS network controls.

Recommended defensive actions

  • Update to XMC20 R18 as recommended in the vendor advisory.
  • Enable the RADIUS Message-Authenticator option on both the XMC20 and the RADIUS server.
  • If upgrading is not immediately possible, segment FOX management traffic to reduce risk.
  • Apply ICS network hardening: minimize exposed ports, avoid direct Internet connectivity, and enforce firewall-based separation.
  • Review the vendor technical documentation and PSIRT advisory for deployment-specific guidance before changing authentication settings.

Evidence notes

This debrief is based on the supplied CISA CSAF advisory ICSA-26-036-05, which was initially released on 2026-01-27 and republished/updated on 2026-02-05 with the Hitachi Energy PSIRT advisory 8DBD000233. The record names Hitachi Energy as vendor, XMC20 as the affected product, and explicitly states the RADIUS MD5 Response Authenticator forgery mechanism plus the Message-Authenticator and XMC20 R18 remediation guidance.

Official resources

Public advisory context: CISA initially released ICSA-26-036-05 on 2026-01-27 and republished the Hitachi Energy PSIRT advisory on 2026-02-05. The source corpus contains only public advisory material and vendor remediation guidance.