ABB Relion 650 and 670 Series
The ABB Relion 650 and 670 series protective relays contain an input validation flaw (CWE-20) in the SPA protocol handler that allows a remote attacker to craft a malicious packet to port 7001/TCP, causing an unhandled exception that reboots the device. The vulnerability results in a denial of service condition that temporarily disables the protection relay's ability to detect and respond to power system faults. No public exploits are known to exist, but the attack requires only network access and no authentication. Affected versions include Relion 650 v1.3.0.5 and earlier, and Relion 670 v1.2.3.18, v2.0.0.11, and v2.1.0.1 and earlier.
- Network access to port 7001/TCP on the Relion 650/670 relay
- The SPA protocol must be enabled on the device (default in most configurations)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/773baaf0-fecf-4cba-8a0f-b171ba3ea282Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.