Hitachi Energy Relion 670/650/SAM600-IO
Insufficient security control vulnerability in Hitachi Energy Relion 670, 650, and SAM600-IO series products allows users with valid credentials to bypass authorization controls. Affected versions: Relion 670 (2.0.0.0–2.0.0.14, 2.1.0.0–2.1.0.4, 2.2.0.0–2.2.0.x, 2.2.1.0–2.2.1.7, 2.2.2.0–2.2.2.4, 2.2.3.0–2.2.3.4, 2.2.4.0–2.2.4.2, 2.2.5.0–2.2.5.1); Relion 650 (1.0.0.0–1.0.0.x, 1.1.0.0–1.1.0.x, 1.2.0.0–1.2.0.x, 2.2.1.0–2.2.1.7, 2.2.4.0–2.2.4.2, 2.2.5.0–2.2.5.1); SAM600-IO (2.2.1.0–2.2.1.7, 2.2.5.0–2.2.5.1). Exploitation requires valid user credentials and network access to the device configuration interface. Successful exploitation could allow an insider or attacker with stolen credentials to modify relay protection settings, bypass safety interlocks, or disable alarms.
- Valid user credentials (engineering workstation login)
- Network access to the Relion device on the configuration port (typically ODBC protocol)
- The device must be reachable from the attacker's network location
Patching may require device reboot — plan for process interruption
/api/v1/advisories/959c2580-a083-4fe5-b663-95e9d4e7e479