PatchSiren cyber security CVE debrief
CVE-2024-3982 Hitachi Energy CVE debrief
CVE-2024-3982 affects Hitachi Energy MACH GWS versions 3.0.0.0 through 3.3.0.0. CISA’s advisory says a local attacker with access to the host could enable the product’s session logging and try to hijack an already established session. The advisory also notes that session logging is disabled by default and only administrators can enable it. Hitachi Energy recommends upgrading to version 3.4.0.0 or contacting the local account team for mitigation guidance.
- Vendor
- Hitachi Energy
- Product
- MACH GWS
- CVSS
- HIGH 8.2
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-02-25
- Original CVE updated
- 2025-02-25
- Advisory published
- 2025-02-25
- Advisory updated
- 2025-02-25
Who should care
OT/ICS operators, Hitachi Energy MACH GWS administrators, and teams responsible for local host access control and patch management on affected systems.
Technical summary
CISA rates the issue CVSS 3.1 8.2 HIGH with vector AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H. The advisory identifies affected Hitachi Energy MACH GWS versions as 3.0.0.0 to 3.3.0.0. The stated attack path requires local access to the machine running MACH GWS and administrator rights to enable session logging, which is disabled by default. The vendor remediation is to upgrade to 3.4.0.0.
Defensive priority
High. The issue is high-severity and can affect confidentiality, integrity, and availability, but it requires local access and elevated privileges, so remediation should be prioritized for systems where local administrator access is not tightly controlled.
Recommended defensive actions
- Upgrade Hitachi Energy MACH GWS to version 3.4.0.0 as recommended in the advisory.
- Restrict local and administrator access to MACH GWS hosts, since the described attack path depends on host access and admin privileges.
- Keep session logging disabled unless operationally required, and follow Hitachi Energy and CISA ICS defense-in-depth guidance for industrial control systems.
Evidence notes
All key claims are taken from the supplied CISA CSAF advisory and vendor remediation references. The affected range (3.0.0.0 to 3.3.0.0), fixed version (3.4.0.0), and impact description are explicitly stated in the advisory metadata. The CVSS vector AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H is provided in the source item. No Known Exploited Vulnerability entry was provided in the corpus.
Official resources
-
CVE-2024-3982 CVE record
CVE.org
-
CVE-2024-3982 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in CISA advisory ICSA-25-133-03 on 2025-02-25 (the CVE published date supplied in the corpus).