First published: Thu Jan 04 2024(Updated: )
A vulnerability exists in the Relion update package signature validation. A tampered update package could cause the IED to restart. After restart the device is back to normal operation. An attacker could exploit the vulnerability by first gaining access to the system with security privileges and attempt to update the IED with a malicious update package. Successful exploitation of this vulnerability will cause the IED to restart, causing a temporary Denial of Service.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Hitachienergy Relion 650 Firmware | =2.2.0 | |
Hitachienergy Relion 650 Firmware | =2.2.1 | |
Hitachienergy Relion 650 Firmware | =2.2.4 | |
Hitachienergy Relion 650 Firmware | =2.2.5 | |
Hitachienergy Relion 650 | ||
All of | ||
Any of | ||
Hitachienergy Relion 670 Firmware | =2.2.0 | |
Hitachienergy Relion 670 Firmware | =2.2.1 | |
Hitachienergy Relion 670 Firmware | =2.2.2 | |
Hitachienergy Relion 670 Firmware | =2.2.3 | |
Hitachienergy Relion 670 Firmware | =2.2.4 | |
Hitachienergy Relion 670 Firmware | =2.2.5 | |
Hitachienergy Relion 670 | ||
All of | ||
Hitachienergy Relion Sam600-io Firmware | =2.2.1 | |
Hitachienergy Relion Sam600-io |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.