CVE-2022-3353
Publication date:
21/02/2023
<br />
<br />
<br />
A vulnerability exists in the IEC 61850 communication stack that affects multiple Hitachi Energy products. <br />
<br />
An attacker could exploit the vulnerability by using a specially crafted message sequence, to force the IEC 61850 MMS-server communication stack, to stop accepting new MMS-client connections. <br />
<br />
<br />
<br />
<br />
Already existing/established client-server connections are not affected.<br />
<br />
<br />
<br />
<br />
<br />
List of affected CPEs:<br />
<br />
<br />
<br />
<br />
* cpe:2.3:o:hitachienergy:fox61x_tego1:r15b08:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16_3:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:fox61x_tego1:r1e01:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:fox61x_tego1:r1d02:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:fox61x_tego1:r1c07:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:fox61x_tego1:r1b02:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:gms600:1.3.0:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.1.*:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.5.*:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0.1:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.0:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.2:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.8.0:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.0.*:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.4:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.5:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:microscada_x_sys600:10:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.*:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2.1:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3.1:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4.1:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:mms:2.2.3:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:pwc600:1.0:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:pwc600:1.1:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:pwc600:1.2:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:reb500:7:*:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:reb500:8:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:relion670:1.2.*:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:relion670:2.0.*:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:relion650:1.1.*:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:relion650:1.3.*:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:relion650:2.1.*:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:relion670:2.1.*:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.1:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.5:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:relion670:2.2.*:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:relion650:2.2.*:*:*:*:*:*:*:*<br />
* cpe:2.3:o:hitachienergy:rtu500cmu:12.*.*:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:rtu500cmu:13.*.*:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:2.*:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:3.0:*:*:*:*:*:*:*<br />
* cpe:2.3:a:hitachienergy:txpert_hub_coretec_5:3.0:*:*:*:*:*:*:*<br />
<br />
<br />
<br />
<br />
<br />
<br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023