Hitachi Energy Relion 670/650/SAM600-IO
A vulnerability exists in Hitachi Energy Relion 670, Relion 650, and SAM600-IO series devices where an older version of VxWorks runs during the boot sequence before the main application firmware loads. An attacker with physical or front network port access who triggers a device reboot can exploit this brief window to execute code in the VxWorks bootloader, potentially causing denial-of-service or other impacts. The vulnerability affects versions: Relion 670 (2.2.0 through 2.2.4.2), Relion 650 (2.2.0 through 2.2.4.2), and SAM600-IO (2.2.1.0 through 2.2.1.6).
- Direct physical or network access to the device front port
- Ability to trigger or control a device reboot
- Device running one of the affected firmware versions
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3547f960-7af4-41fe-9b62-a28a43ac7eb5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.