Schweitzer Engineering Laboratories, Inc. SEL-3620 and SEL-3622
SEL-3620 and SEL-3622 Security Gateways (R202, R203, R204 models) contain an improper access control vulnerability (CWE-284) that allows an unauthenticated remote attacker to read sensitive information from the device, including network credentials, access keys, and configuration data. The vulnerability has a CVSS score of 7.2 (High) and requires only network access with no authentication or user interaction. Affected devices act as security boundaries between enterprise networks and control system networks, so compromise could expose credentials used to access downstream protective relays, RTUs, and other critical equipment.
- Network access to the SEL Security Gateway from the internet or internal network
- No authentication required
- Device configured with default or weak access controls
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5c064b31-0d99-4cfe-ae0d-e470316114cdGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.