CVE-2021-22283

Sep 3, 2024

Published Date: 2023-02-28T05:15Z
Last Modified: 2023-11-07T03:30Z

CVSS Score: 5.5 (MEDIUM)

EPSS Score: 0.04%

Risk Score: 3.85 (MEDIUM)

Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.

Meter Needle
CVSS: 5.5  |  EPSS: 0.04%

Description: Improper Initialization vulnerability in ABB Relion protection relays – 611 series, ABB Relion protection relays – 615 series IEC 4.0 FP1, ABB Relion protection relays – 615 series CN 4.0 FP1, ABB Relion protection relays – 615 series IEC 5.0, ABB Relion protection relays – 615 series IEC 5.0 FP1, ABB Relion protection relays – 620 series IEC/CN 2.0, ABB Relion protection relays – 620 series IEC/CN 2.0 FP1, ABB Relion protection relays – REX640 PCL1, ABB Relion protection relays – REX640 PCL2, ABB Relion protection relays – REX640 PCL3, ABB Relion protection relays – RER615, ABB Remote Monitoring and Control – REC615, ABB Merging Unit- SMU615 allows Communication Channel Manipulation.This issue affects Relion protection relays – 611 series: from 1.0.0 before 2.0.3; Relion protection relays – 615 series IEC 4.0 FP1: from 4.1.0 before 4.1.9; Relion protection relays – 615 series CN 4.0 FP1: from 4.1.0 before 4.1.8; Relion protection relays – 615 series IEC 5.0: from 5.0.0 before 5.0.12; Relion protection relays – 615 series IEC 5.0 FP1: from 5.1.0 before 5.1.20; Relion protection relays – 620 series IEC/CN 2.0: from 2.0.0 before 2.0.11; Relion protection relays – 620 series IEC/CN 2.0 FP1: from 2.1.0 before 2.1.15; Relion protection relays – REX640 PCL1: from 1.0.0 before 1.0.8; Relion protection relays – REX640 PCL2: from 1.1.0 before 1.1.4; Relion protection relays – REX640 PCL3: from 1.2.0 before 1.2.1; Relion protection relays – RER615: from 2.0.0 before 2.0.3; Remote Monitoring and Control – REC615: from 1.0.0 before 2.0.3; Merging Unit- SMU615: from 1.0.0 before 1.0.2.

Mitre ATT&CK Technical v15.1

T1053.002 – At

Technical Analysis & Mitigation Measures

Reference Links

Vendor - Produce - Version

Disclaimer

The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.