7.5
CWE
404
Advisory Published
Updated

CVE-2022-3353: IEC 61850 MMS-Server Vulnerability in multiple Hitachi Energy Products

First published: Tue Feb 21 2023(Updated: )

A vulnerability exists in the IEC 61850 communication stack that affects multiple Hitachi Energy products.  An attacker could exploit the vulnerability by using a specially crafted message sequence, to force the IEC 61850 MMS-server communication stack, to stop accepting new MMS-client connections.  Already existing/established client-server connections are not affected. List of affected CPEs: * cpe:2.3:o:hitachienergy:fox61x_tego1:r15b08:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16_3:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r1e01:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r1d02:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r1c07:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:fox61x_tego1:r1b02:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:gms600:1.3.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.1.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.5.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0.1:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.2:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.8.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.0.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.4:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.5:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2.1:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3.1:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4.1:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:mms:2.2.3:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:pwc600:1.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:pwc600:1.1:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:pwc600:1.2:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:reb500:7:*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:reb500:8:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion670:1.2.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion670:2.0.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion650:1.1.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion650:1.3.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion650:2.1.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion670:2.1.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.1:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.5:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion670:2.2.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:relion650:2.2.*:*:*:*:*:*:*:* * cpe:2.3:o:hitachienergy:rtu500cmu:12.*.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:rtu500cmu:13.*.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:2.*:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:3.0:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:txpert_hub_coretec_5:3.0:*:*:*:*:*:*:*

Credit: cybersecurity@hitachienergy.com

Affected SoftwareAffected VersionHow to fix
Hitachienergy Sys600 Firmware>=10.1<=10.3.1
Hitachienergy Gms600 Firmware
Hitachienergy Rtu500>=12.0.1.0<=12.0.14.0
Hitachienergy Rtu500>=12.2.1.0<=12.2.11.0
Hitachienergy Rtu500>=12.4.1.0<=12.4.11.0
Hitachienergy Rtu500>=12.6.1.0<=12.6.8.0
Hitachienergy Rtu500>=12.7.1.0<=12.7.4.0
Hitachienergy Rtu500>=13.2.1.0<=13.2.5.0
Hitachienergy Rtu500>=13.3.1<=13.3.3
Hitachienergy Rtu500=13.4.1
Hitachi Energy RTU500 Firmware
Hitachienergy Reb500 Firmware>=7.0<8.3.3
Hitachi Energy REB500
Hitachienergy Pwc600 Firmware=1.0
Hitachienergy Pwc600 Firmware=1.1
Hitachienergy Pwc600 Firmware=1.2
Hitachi Energy PWC600 Connectivity Package
Hitachienergy Modular Switchgear Monitoring Firmware<=2.2.3
Hitachienergy Modular Switchgear Monitoring
Hitachi Energy ITT600 SA Explorer=1.1.0
Hitachi Energy ITT600 SA Explorer=1.1.1
Hitachi Energy ITT600 SA Explorer=1.1.2
Hitachi Energy ITT600 SA Explorer=1.5.0
Hitachi Energy ITT600 SA Explorer=1.5.1
Hitachi Energy ITT600 SA Explorer=1.6.0
Hitachi Energy ITT600 SA Explorer=1.6.0.1
Hitachi Energy ITT600 SA Explorer=1.7.0
Hitachi Energy ITT600 SA Explorer=1.7.2
Hitachi Energy ITT600 SA Explorer=1.8.0
Hitachi Energy ITT600 SA Explorer=2.0.1
Hitachi Energy ITT600 SA Explorer=2.0.2
Hitachi Energy ITT600 SA Explorer=2.0.3
Hitachi Energy ITT600 SA Explorer=2.0.4.1
Hitachi Energy ITT600 SA Explorer=2.0.5.0
Hitachi Energy ITT600 SA Explorer=2.0.5.4
Hitachi Energy ITT600 SA Explorer=2.1.0.4
Hitachi Energy ITT600 SA Explorer=2.1.0.5
Hitachi Energy Relion Sam600-io=2.2.1
Hitachi Energy Relion Sam600-io=2.2.5
Hitachi Energy Relion Sam600-io
Hitachi Energy Relion 650 Firmware=1.1
Hitachi Energy Relion 650 Firmware=1.3
Hitachi Energy Relion 650 Firmware=2.1
Hitachi Energy Relion 650 Firmware=2.2.0
Hitachi Energy Relion 650 Firmware=2.2.1
Hitachi Energy Relion 650 Firmware=2.2.2
Hitachi Energy Relion 650 Firmware=2.2.3
Hitachi Energy Relion 650 Firmware=2.2.4
Hitachi Energy Relion 650 Firmware=2.2.5
Hitachi Energy Relion 650 Firmware
Hitachienergy Relion 670 Firmware=1.2
Hitachienergy Relion 670 Firmware=2.0
Hitachienergy Relion 670 Firmware=2.1
Hitachienergy Relion 670 Firmware=2.2.0
Hitachienergy Relion 670 Firmware=2.2.1
Hitachienergy Relion 670 Firmware=2.2.2
Hitachienergy Relion 670 Firmware=2.2.3
Hitachienergy Relion 670 Firmware=2.2.4
Hitachienergy Relion 670 Firmware=2.2.5
Hitachi Energy Relion 670
Hitachienergy Gms600 Firmware=1.3.0
Hitachi Energy GMS600
Hitachi Energy Fox615=r1b02
Hitachi Energy Fox615=r1c07
Hitachi Energy Fox615=r1d02
Hitachi Energy Fox615=r1e01
Hitachi Energy Fox615=r2b16
Hitachi Energy Fox615=r2b16_03
Hitachi Energy Fox615=r15b08
Hitachi Energy Fox615
Abb Txpert Hub Coretec 4 Firmware>=2.0.0<=3.0.0
Hitachienergy Txpert Hub Coretec 4 Firmware
Hitachienergy Txpert Hub Coretec 5=3.0.0
Hitachienergy Txpert Hub Coretec 5 Firmware

Remedy

Upgrade the system once remediated version is available.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2022-3353?

    CVE-2022-3353 is classified as a vulnerability that affects multiple Hitachi Energy products, potentially leading to service disruption.

  • How do I fix CVE-2022-3353?

    To fix CVE-2022-3353, you should update the affected Hitachi Energy firmware to the latest available version.

  • Which products are affected by CVE-2022-3353?

    CVE-2022-3353 affects various Hitachi Energy products, including the Sys600, Rtu500, and Pwc600 firmware versions.

  • What can an attacker do by exploiting CVE-2022-3353?

    An attacker exploiting CVE-2022-3353 could send specially crafted message sequences to disrupt the IEC 61850 MMS-server communication stack.

  • Is there a workaround for CVE-2022-3353?

    Currently, there are no documented workarounds for CVE-2022-3353, so applying firmware updates is the recommended action.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203