CVE-2021-35534

high-risk
Published 2021-11-18

Insufficient security control vulnerability in internal database access mechanism of Hitachi Energy Relion 670/650/SAM600-IO, Relion 650, GMS600, PWC600 allows attacker who successfully exploited this vulnerability, of which the product does not sufficiently restrict access to an internal database tables, could allow anybody with user credentials to bypass security controls that is enforced by the product. Consequently, exploitation may lead to unauthorized modifications on data/firmware, and/or to permanently disabling the product. This issue affects: Hitachi Energy Relion 670 Series 2.0 all revisions; 2.2.2 all revisions; 2.2.3 versions prior to 2.2.3.5. Hitachi Energy Relion 670/650 Series 2.1 all revisions. 2.2.0 all revisions; 2.2.4 all revisions; Hitachi Energy Relion 670/650/SAM600-IO 2.2.1 all revisions; 2.2.5 versions prior to 2.2.5.2. Hitachi Energy Relion 650 1.0 all revisions. 1.1 all revisions; 1.2 all revisions; 1.3 versions prior to 1.3.0.8; Hitachi Energy GMS600 1.3.0; 1.3.0.1; 1.2.0. Hitachi Energy PWC600 1.0.1 version 1.0.1.4 and prior versions; 1.1.0 version 1.1.0.1 and prior versions.

Do I need to act?

-
0.65% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.2/10 High
NETWORK / LOW complexity

Affected Products (20)

Gms600 Firmware
Gms600 Firmware
Gms600 Firmware
Relion 670 Firmware
Relion 670 Firmware
Relion 670 Firmware
Relion 670 Firmware
Relion 670 Firmware
Relion 670 Firmware
Relion 670 Firmware
Relion 670 Firmware
Relion 670 Firmware
Relion 650 Firmware
Relion 650 Firmware
Relion 650 Firmware
Relion 650 Firmware
Relion 650 Firmware
Relion 650 Firmware
Relion 650 Firmware
Relion 650 Firmware

Affected Vendors

50
/ 100
high-risk
Severity 26/34 · High
Exploitability 2/34 · Minimal
Exposure 22/34 · High