A vulnerability exists in the Relion update package signature validation. A tampered update package could cause the IED to restart. After restart the device is back to normal operation.
An attacker could exploit the vulnerability by first gaining access to
the system with security privileges and attempt to update the IED
with a malicious update package. Successful exploitation of this
vulnerability will cause the IED to restart, causing a temporary Denial of Service.
References
Link | Resource |
---|---|
https://publisher.hitachienergy.com/preview?DocumentID=8DBD000146&LanguageCode=en&DocumentPartId=&Action=Launch | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2024-01-04 10:15
Updated : 2024-01-10 16:32
NVD link : CVE-2022-3864
Mitre link : CVE-2022-3864
CVE.ORG link : CVE-2022-3864
JSON object : View
Products Affected
hitachienergy
- relion_670_firmware
- relion_650
- relion_670
- relion_sam600-io_firmware
- relion_650_firmware
- relion_sam600-io
CWE
CWE-347
Improper Verification of Cryptographic Signature