7.5

CVE-2022-3353



A vulnerability exists in the IEC 61850 communication stack that affects multiple Hitachi Energy products. 

An attacker could exploit the vulnerability by using a specially crafted message sequence, to force the IEC 61850 MMS-server communication stack, to stop accepting new MMS-client connections. 




Already existing/established client-server connections are not affected.





List of affected CPEs:




  *  cpe:2.3:o:hitachienergy:fox61x_tego1:r15b08:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16_3:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:fox61x_tego1:r1e01:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:fox61x_tego1:r1d02:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:fox61x_tego1:r1c07:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:fox61x_tego1:r1b02:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:gms600:1.3.0:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.1.*:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.5.*:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0.1:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.0:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.2:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.8.0:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.0.*:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.4:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.5:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:microscada_x_sys600:10:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:microscada_x_sys600:10.*:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2.1:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3.1:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4.1:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:mms:2.2.3:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:pwc600:1.0:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:pwc600:1.1:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:pwc600:1.2:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:reb500:7:*:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:reb500:8:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:relion670:1.2.*:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:relion670:2.0.*:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:relion650:1.1.*:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:relion650:1.3.*:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:relion650:2.1.*:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:relion670:2.1.*:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.1:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.5:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:relion670:2.2.*:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:relion650:2.2.*:*:*:*:*:*:*:*
  *  cpe:2.3:o:hitachienergy:rtu500cmu:12.*.*:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:rtu500cmu:13.*.*:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:2.*:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:3.0:*:*:*:*:*:*:*
  *  cpe:2.3:a:hitachienergy:txpert_hub_coretec_5:3.0:*:*:*:*:*:*:*






Daten sind bereitgestellt durch National Vulnerability Database (NVD)
HitachienergySys600 Firmware Version >= 10.1 <= 10.3.1
   HitachienergySys600 Version-
HitachienergyRtu500 Firmware Version >= 12.0.1.0 <= 12.0.14.0
   HitachienergyRtu500 Version-
HitachienergyRtu500 Firmware Version >= 12.2.1.0 <= 12.2.11.0
   HitachienergyRtu500 Version-
HitachienergyRtu500 Firmware Version >= 12.4.1.0 <= 12.4.11.0
   HitachienergyRtu500 Version-
HitachienergyRtu500 Firmware Version >= 12.6.1.0 <= 12.6.8.0
   HitachienergyRtu500 Version-
HitachienergyRtu500 Firmware Version >= 12.7.1.0 <= 12.7.4.0
   HitachienergyRtu500 Version-
HitachienergyRtu500 Firmware Version >= 13.2.1.0 <= 13.2.5.0
   HitachienergyRtu500 Version-
HitachienergyRtu500 Firmware Version >= 13.3.1 <= 13.3.3
   HitachienergyRtu500 Version-
HitachienergyRtu500 Firmware Version13.4.1
   HitachienergyRtu500 Version-
HitachienergyReb500 Firmware Version >= 7.0 < 8.3.3
   HitachienergyReb500 Version-
HitachienergyPwc600 Firmware Version1.0
   HitachienergyPwc600 Version-
HitachienergyPwc600 Firmware Version1.1
   HitachienergyPwc600 Version-
HitachienergyPwc600 Firmware Version1.2
   HitachienergyPwc600 Version-
HitachienergyItt600 Sa Explorer Version1.6.0.1
HitachienergyItt600 Sa Explorer Version2.0.4.1
HitachienergyItt600 Sa Explorer Version2.0.5.0
HitachienergyItt600 Sa Explorer Version2.0.5.4
HitachienergyItt600 Sa Explorer Version2.1.0.4
HitachienergyItt600 Sa Explorer Version2.1.0.5
HitachienergyRelion 650 Firmware Version1.1
   HitachienergyRelion 650 Version-
HitachienergyRelion 650 Firmware Version1.3
   HitachienergyRelion 650 Version-
HitachienergyRelion 650 Firmware Version2.1
   HitachienergyRelion 650 Version-
HitachienergyRelion 650 Firmware Version2.2.0
   HitachienergyRelion 650 Version-
HitachienergyRelion 650 Firmware Version2.2.1
   HitachienergyRelion 650 Version-
HitachienergyRelion 650 Firmware Version2.2.2
   HitachienergyRelion 650 Version-
HitachienergyRelion 650 Firmware Version2.2.3
   HitachienergyRelion 650 Version-
HitachienergyRelion 650 Firmware Version2.2.4
   HitachienergyRelion 650 Version-
HitachienergyRelion 650 Firmware Version2.2.5
   HitachienergyRelion 650 Version-
HitachienergyRelion 670 Firmware Version1.2
   HitachienergyRelion 670 Version-
HitachienergyRelion 670 Firmware Version2.0
   HitachienergyRelion 670 Version-
HitachienergyRelion 670 Firmware Version2.1
   HitachienergyRelion 670 Version-
HitachienergyRelion 670 Firmware Version2.2.0
   HitachienergyRelion 670 Version-
HitachienergyRelion 670 Firmware Version2.2.1
   HitachienergyRelion 670 Version-
HitachienergyRelion 670 Firmware Version2.2.2
   HitachienergyRelion 670 Version-
HitachienergyRelion 670 Firmware Version2.2.3
   HitachienergyRelion 670 Version-
HitachienergyRelion 670 Firmware Version2.2.4
   HitachienergyRelion 670 Version-
HitachienergyRelion 670 Firmware Version2.2.5
   HitachienergyRelion 670 Version-
HitachienergyGms600 Firmware Version1.3.0
   HitachienergyGms600 Version-
HitachienergyFox615 Tego1 Firmware Versionr1b02
   HitachienergyFox615 Tego1 Version-
HitachienergyFox615 Tego1 Firmware Versionr1c07
   HitachienergyFox615 Tego1 Version-
HitachienergyFox615 Tego1 Firmware Versionr1d02
   HitachienergyFox615 Tego1 Version-
HitachienergyFox615 Tego1 Firmware Versionr1e01
   HitachienergyFox615 Tego1 Version-
HitachienergyFox615 Tego1 Firmware Versionr2b16
   HitachienergyFox615 Tego1 Version-
HitachienergyFox615 Tego1 Firmware Versionr2b16_03
   HitachienergyFox615 Tego1 Version-
HitachienergyFox615 Tego1 Firmware Versionr15b08
   HitachienergyFox615 Tego1 Version-
HitachienergyTxpert Hub Coretec 4 Firmware Version >= 2.0.0 <= 3.0.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.33% 0.529
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cybersecurity@hitachienergy.com 5.9 2.2 3.6
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE-404 Improper Resource Shutdown or Release

The product does not release or incorrectly releases a resource before it is made available for re-use.