Hitachi Energy Relion 670, 650 and SAM600-IO
This advisory addresses an input validation failure (CWE-20) in Hitachi Energy Relion 670, 650, and SAM600-IO series devices. The vulnerability allows remote attackers to cause a denial of service condition by sending malformed inputs to the device, causing it to crash or hang and stop performing protection and monitoring functions. Affected versions range from version 1.1 through 2.2.3 across the Relion product family. Hitachi Energy has released patched revisions for most product versions; legacy versions 1.1 require either mitigation or upgrade to newer products.
- Network access to the Relion device's management or communications port (typically Modbus TCP or similar industrial protocol ports)
- No authentication required for the vulnerable input handling
- Device must be reachable from an attacker-controlled network or compromised system on the same utility network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fe1edaa8-a7d7-4d0e-895a-71b304732ab7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.