Unknown
CVE-2022-3353
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-3353
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability exists in the IEC 61850 communication stack that affects multiple Hitachi Energy products.
An attacker could exploit the vulnerability by using a specially crafted message sequence, to force the IEC 61850 MMS-server communication stack, to stop accepting new MMS-client connections.
Already existing/established client-server connections are not affected.
List of affected CPEs:
- cpe:2.3:o:hitachienergy:fox61x_tego1:r15b08:::::::*
- cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16_3:::::::*
- cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16:::::::*
- cpe:2.3:o:hitachienergy:fox61x_tego1:r1e01:::::::*
- cpe:2.3:o:hitachienergy:fox61x_tego1:r1d02:::::::*
- cpe:2.3:o:hitachienergy:fox61x_tego1:r1c07:::::::*
- cpe:2.3:o:hitachienergy:fox61x_tego1:r1b02:::::::*
- cpe:2.3:a:hitachienergy:gms600:1.3.0:::::::*
- cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.1.:::::::
- cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.5.:::::::
- cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0:::::::*
- cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0.1:::::::*
- cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.0:::::::*
- cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.2:::::::*
- cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.8.0:::::::*
- cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.0.:::::::
- cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.4:::::::*
- cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.5:::::::*
- cpe:2.3:a:hitachienergy:microscada_x_sys600:10:::::::*
- cpe:2.3:a:hitachienergy:microscada_x_sys600:10.:::::::
- cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2:::::::*
- cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2.1:::::::*
- cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3:::::::*
- cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3.1:::::::*
- cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4:::::::*
- cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4.1:::::::*
- cpe:2.3:a:hitachienergy:mms:2.2.3:::::::*
- cpe:2.3:a:hitachienergy:pwc600:1.0:::::::*
- cpe:2.3:a:hitachienergy:pwc600:1.1:::::::*
- cpe:2.3:a:hitachienergy:pwc600:1.2:::::::*
- cpe:2.3:o:hitachienergy:reb500:7::::::::
- cpe:2.3:o:hitachienergy:reb500:8:::::::*
- cpe:2.3:o:hitachienergy:relion670:1.2.:::::::
- cpe:2.3:o:hitachienergy:relion670:2.0.:::::::
- cpe:2.3:o:hitachienergy:relion650:1.1.:::::::
- cpe:2.3:o:hitachienergy:relion650:1.3.:::::::
- cpe:2.3:o:hitachienergy:relion650:2.1.:::::::
- cpe:2.3:o:hitachienergy:relion670:2.1.:::::::
- cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.1:::::::*
- cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.5:::::::*
- cpe:2.3:o:hitachienergy:relion670:2.2.:::::::
- cpe:2.3:o:hitachienergy:relion650:2.2.:::::::
- cpe:2.3:o:hitachienergy:rtu500cmu:12..:::::::*
- cpe:2.3:a:hitachienergy:rtu500cmu:13..:::::::*
- cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:2.:::::::
- cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:3.0:::::::*
- cpe:2.3:a:hitachienergy:txpert_hub_coretec_5:3.0:::::::*
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- fox615 tego1 firmware r15b08,
- fox615 tego1 firmware r1b02,
- fox615 tego1 firmware r1c07,
- fox615 tego1 firmware r1d02,
- fox615 tego1 firmware r1e01,
- fox615 tego1 firmware r2b16,
- fox615 tego1 firmware r2b16 03,
- gms600 firmware 1.3.0,
- itt600 sa explorer 1.1.0,
- itt600 sa explorer 1.1.1,
- itt600 sa explorer 1.1.2,
- itt600 sa explorer 1.5.0,
- itt600 sa explorer 1.5.1,
- itt600 sa explorer 1.6.0,
- itt600 sa explorer 1.6.0.1,
- itt600 sa explorer 1.7.0,
- itt600 sa explorer 1.7.2,
- itt600 sa explorer 1.8.0,
- itt600 sa explorer 2.0.1,
- itt600 sa explorer 2.0.2,
- itt600 sa explorer 2.0.3,
- itt600 sa explorer 2.0.4.1,
- itt600 sa explorer 2.0.5.0,
- itt600 sa explorer 2.0.5.4,
- itt600 sa explorer 2.1.0.4,
- itt600 sa explorer 2.1.0.5,
- modular switchgear monitoring firmware,
- pwc600 firmware 1.0,
- pwc600 firmware 1.1,
- pwc600 firmware 1.2,
- reb500 firmware,
- relion 650 firmware 1.1,
- relion 650 firmware 1.3,
- relion 650 firmware 2.1,
- relion 650 firmware 2.2.0,
- relion 650 firmware 2.2.1,
- relion 650 firmware 2.2.2,
- relion 650 firmware 2.2.3,
- relion 650 firmware 2.2.4,
- relion 650 firmware 2.2.5,
- relion 670 firmware 1.2,
- relion 670 firmware 2.0,
- relion 670 firmware 2.1,
- relion 670 firmware 2.2.0,
- relion 670 firmware 2.2.1,
- relion 670 firmware 2.2.2,
- relion 670 firmware 2.2.3,
- relion 670 firmware 2.2.4,
- relion 670 firmware 2.2.5,
- relion sam600-io firmware 2.2.1,
- relion sam600-io firmware 2.2.5,
- rtu500 firmware,
- rtu500 firmware 13.4.1,
- sys600 firmware,
- txpert hub coretec 4 firmware,
- txpert hub coretec 5 firmware 3.0.0
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: