8.1
CVE-2021-35535
- EPSS 0.31%
- Published 18.11.2021 16:15:08
- Last modified 21.11.2024 06:12:27
- Source cybersecurity@hitachienergy.co
- Teams watchlist Login
- Open Login
Insecure Boot Image vulnerability in Hitachi Energy Relion Relion 670/650/SAM600-IO series allows an attacker who manages to get access to the front network port and to cause a reboot sequences of the device may exploit the vulnerability, where there is a tiny time gap during the booting process where an older version of VxWorks is loaded prior to application firmware booting, could exploit the vulnerability in the older version of VxWorks and cause a denial-of-service on the product. This issue affects: Hitachi Energy Relion 670 Series 2.2.2 all revisions; 2.2.3 versions prior to 2.2.3.3. Hitachi Energy Relion 670/650 Series 2.2.0 all revisions; 2.2.4 all revisions. Hitachi Energy Relion 670/650/SAM600-IO 2.2.1 all revisions.
Data is provided by the National Vulnerability Database (NVD)
Hitachienergy ≫ Relion 670 Firmware Version >= 2.2.3 <= 2.2.3.3
Hitachienergy ≫ Relion 670 Firmware Version2.2.0
Hitachienergy ≫ Relion 670 Firmware Version2.2.1
Hitachienergy ≫ Relion 670 Firmware Version2.2.2
Hitachienergy ≫ Relion 670 Firmware Version2.2.4
Hitachienergy ≫ Relion 650 Firmware Version2.2.0
Hitachienergy ≫ Relion 650 Firmware Version2.2.1
Hitachienergy ≫ Relion 650 Firmware Version2.2.4
Hitachienergy ≫ Relion Sam600-io Firmware Version2.2.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.31% | 0.509 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
cybersecurity@hitachienergy.com | 8.1 | 1.4 | 6 |
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
CWE-1188 Initialization of a Resource with an Insecure Default
The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.