Lucene search

K
cve[email protected]CVE-2023-4518
HistoryDec 01, 2023 - 3:15 p.m.

CVE-2023-4518

2023-12-0115:15:07
CWE-1284
CWE-20
web.nvd.nist.gov
11
vulnerability
input validation
goose messages
device reboot
cve-2023-4518
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.4 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

A vulnerability exists in the input validation of the GOOSE
messages where out of range values received and processed
by the IED caused a reboot of the device. In order for an
attacker to exploit the vulnerability, goose receiving blocks need
to be configured.

Affected configurations

NVD
Node
hitachienergyrelion_670_firmwareRange2.2.02.2.2.6
OR
hitachienergyrelion_670_firmwareRange2.2.32.2.3.7
OR
hitachienergyrelion_670_firmwareRange2.2.42.2.4.4
OR
hitachienergyrelion_670_firmwareRange2.2.52.2.5.6
AND
hitachienergyrelion_670Match-
Node
hitachienergyrelion_650_firmwareRange2.2.42.2.4.4
OR
hitachienergyrelion_650_firmwareRange2.2.52.2.5.6
OR
hitachienergyrelion_650_firmwareMatch2.2.1
OR
hitachienergyrelion_650_firmwareMatch2.2.1.6
AND
hitachienergyrelion_650Match-
Node
hitachienergyrelion_sam600-io_firmwareRange2.2.52.2.5.6
OR
hitachienergyrelion_sam600-io_firmwareMatch2.2.1
OR
hitachienergyrelion_sam600-io_firmwareMatch2.2.1.6
AND
hitachienergyrelion_sam600-ioMatch-

CNA Affected

[
  {
    "defaultStatus": "affected",
    "product": "Relion670",
    "vendor": "Hitachi Energy",
    "versions": [
      {
        "status": "affected",
        "version": " Relion 670 series version 2.2.0 all revisions"
      },
      {
        "status": "affected",
        "version": "Relion 670/650/SAM600-IO series version 2.2.1 all revisions"
      },
      {
        "status": "affected",
        "version": "elion 670 series version 2.2.2 all revisions"
      },
      {
        "status": "affected",
        "version": "Relion 670 series version 2.2.3 all revisions"
      },
      {
        "status": "affected",
        "version": "Relion 670/650 series version 2.2.4 all revisions"
      },
      {
        "status": "affected",
        "version": "Relion 670/650/SAM600-IO series version 2.2.5 all revisions"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.4 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

Related for CVE-2023-4518