Schweitzer Engineering Laboratories SEL-411L
The SEL-411L relays (R118–R129 series) are vulnerable to clickjacking attacks via the web interface. An attacker can trick an authenticated user into unknowingly performing actions on the relay by embedding the interface within a malicious webpage. Schweitzer Engineering Laboratories has stated patches have been distributed to asset owners; however, the advisory notes "no fix available" for all listed R-series models, indicating either patches are not yet released or these models will not receive fixes. The vulnerability is classified as informational (CWE-1021: Improper Restriction of Rendered UI Layers or Frames).
- User must be authenticated to the SEL-411L web interface
- User must visit an attacker-controlled or compromised web page while logged into the device
- Device web interface must be accessible from the network where the user browses
Patching may require device reboot — plan for process interruption
/api/v1/advisories/622d5cee-e677-4a91-a375-502b4effd056Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.