Hitachi Energy GMS600, PWC600, and Relion
Improper access control in Hitachi Energy GMS600, PWC600, and Relion relay series allows users with high-level privileges to access unauthorized functions and information on the device. The vulnerability exists in multiple versions of Relion 670/650 series (versions 2.0, 2.1, 2.2.0–2.2.3.4, 2.2.4, 2.2.5–2.2.5.1), PWC600 (versions 1.0.1.0, 1.0.1.1, 1.0.1.3, and others), GMS600 (versions 1.2.0, 1.3.0, 1.3.1.0), and Relion 650 series (versions 1.0, 1.1, 1.2, 1.3). Hitachi Energy has released firmware updates that address this vulnerability. The vulnerability has a CVSS score of 7.2 (high) but is not currently known to be actively exploited.
- High-level user privileges (administrator or engineer account)
- Network access to the affected device's management interface
- Access to the device locally or via the substation network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/53fbd6ce-483f-409b-825b-248e89f6b6e0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.