PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-3982 Hitachi Energy CVE debrief

CVE-2024-3982 affects Hitachi Energy MACH GWS versions 3.0.0.0 through 3.3.0.0. CISA’s advisory says a local attacker with access to the host could enable the product’s session logging and try to hijack an already established session. The advisory also notes that session logging is disabled by default and only administrators can enable it. Hitachi Energy recommends upgrading to version 3.4.0.0 or contacting the local account team for mitigation guidance.

Vendor
Hitachi Energy
Product
MACH GWS
CVSS
HIGH 8.2
CISA KEV
Not listed in stored evidence
Original CVE published
2025-02-25
Original CVE updated
2025-02-25
Advisory published
2025-02-25
Advisory updated
2025-02-25

Who should care

OT/ICS operators, Hitachi Energy MACH GWS administrators, and teams responsible for local host access control and patch management on affected systems.

Technical summary

CISA rates the issue CVSS 3.1 8.2 HIGH with vector AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H. The advisory identifies affected Hitachi Energy MACH GWS versions as 3.0.0.0 to 3.3.0.0. The stated attack path requires local access to the machine running MACH GWS and administrator rights to enable session logging, which is disabled by default. The vendor remediation is to upgrade to 3.4.0.0.

Defensive priority

High. The issue is high-severity and can affect confidentiality, integrity, and availability, but it requires local access and elevated privileges, so remediation should be prioritized for systems where local administrator access is not tightly controlled.

Recommended defensive actions

  • Upgrade Hitachi Energy MACH GWS to version 3.4.0.0 as recommended in the advisory.
  • Restrict local and administrator access to MACH GWS hosts, since the described attack path depends on host access and admin privileges.
  • Keep session logging disabled unless operationally required, and follow Hitachi Energy and CISA ICS defense-in-depth guidance for industrial control systems.

Evidence notes

All key claims are taken from the supplied CISA CSAF advisory and vendor remediation references. The affected range (3.0.0.0 to 3.3.0.0), fixed version (3.4.0.0), and impact description are explicitly stated in the advisory metadata. The CVSS vector AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H is provided in the source item. No Known Exploited Vulnerability entry was provided in the corpus.

Official resources

Publicly disclosed in CISA advisory ICSA-25-133-03 on 2025-02-25 (the CVE published date supplied in the corpus).