Insufficient security control vulnerability in internal database access mechanism of Hitachi Energy Relion 670/650/SAM600-IO, Relion 650, GMS600, PWC600 allows attacker who successfully exploited this vulnerability, of which the product does not sufficiently restrict access to an internal database tables, could allow anybody with user credentials to bypass security controls that is enforced by the product. Consequently, exploitation may lead to unauthorized modifications on data/firmware, and/or to permanently disabling the product. This issue affects: Hitachi Energy Relion 670 Series 2.0 all revisions; 2.2.2 all revisions; 2.2.3 versions prior to 2.2.3.5. Hitachi Energy Relion 670/650 Series 2.1 all revisions. 2.2.0 all revisions; 2.2.4 all revisions; Hitachi Energy Relion 670/650/SAM600-IO 2.2.1 all revisions; 2.2.5 versions prior to 2.2.5.2. Hitachi Energy Relion 650 1.0 all revisions. 1.1 all revisions; 1.2 all revisions; 1.3 versions prior to 1.3.0.8; Hitachi Energy GMS600 1.3.0; 1.3.0.1; 1.2.0. Hitachi Energy PWC600 1.0.1 version 1.0.1.4 and prior versions; 1.1.0 version 1.1.0.1 and prior versions.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
19 Apr 2023, 15:32
Type | Values Removed | Values Added |
---|---|---|
First Time |
Hitachienergy gms600 Firmware
Hitachienergy relion Sam600-io Firmware Hitachienergy pwc600 Hitachienergy relion 670 Firmware Hitachienergy relion 650 Hitachienergy pwc600 Firmware Hitachienergy relion 650 Firmware Hitachienergy relion 670 Hitachienergy relion Sam600-io Hitachienergy gms600 Hitachienergy |
|
CPE | cpe:2.3:o:hitachi:relion_sam600-io_firmware:2.2.5:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_650_firmware:2.2.1:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_670_firmware:2.2.4:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_670_firmware:2.1.0:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_670_firmware:2.2.5:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_670_firmware:2.2.3:*:*:*:*:*:*:* cpe:2.3:o:hitachi:gms600_firmware:1.3.1.0:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_650_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_650_firmware:2.2.5:*:*:*:*:*:*:* cpe:2.3:o:hitachi:pwc600_firmware:1.0.1.4:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_650_firmware:1.2.0:*:*:*:*:*:*:* cpe:2.3:h:hitachi:relion_sam600-io:-:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_670_firmware:2.2.1:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_670_firmware:2.0.0:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_sam600-io_firmware:2.2.1:*:*:*:*:*:*:* cpe:2.3:h:hitachi:gms600:-:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_670_firmware:2.2.2:*:*:*:*:*:*:* cpe:2.3:o:hitachi:pwc600_firmware:1.1.0.1:*:*:*:*:*:*:* cpe:2.3:h:hitachi:relion_650:-:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_670_firmware:2.2.0:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_650_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_650_firmware:2.2.0:*:*:*:*:*:*:* cpe:2.3:o:hitachi:pwc600_firmware:1.1.0.0:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_670_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_650_firmware:2.1.0:*:*:*:*:*:*:* cpe:2.3:o:hitachi:pwc600_firmware:1.0.1.0:*:*:*:*:*:*:* cpe:2.3:o:hitachi:pwc600_firmware:1.0.1.3:*:*:*:*:*:*:* cpe:2.3:o:hitachi:gms600_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:h:hitachi:pwc600:-:*:*:*:*:*:*:* cpe:2.3:o:hitachi:relion_650_firmware:2.2.4:*:*:*:*:*:*:* cpe:2.3:h:hitachi:relion_670:-:*:*:*:*:*:*:* cpe:2.3:o:hitachi:pwc600_firmware:1.0.1.1:*:*:*:*:*:*:* cpe:2.3:o:hitachi:gms600_firmware:1.2.0:*:*:*:*:*:*:* |
cpe:2.3:o:hitachienergy:relion_670_firmware:2.2.0:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:pwc600_firmware:1.0.1.4:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:gms600_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:h:hitachienergy:relion_sam600-io:-:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_670_firmware:2.2.3:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_sam600-io_firmware:2.2.1:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_650_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:gms600_firmware:1.2.0:*:*:*:*:*:*:* cpe:2.3:h:hitachienergy:pwc600:-:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_670_firmware:2.2.4:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:pwc600_firmware:1.1.0.0:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:pwc600_firmware:1.0.1.0:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:gms600_firmware:1.3.1.0:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_670_firmware:2.2.2:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_650_firmware:2.2.4:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_650_firmware:2.2.1:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_670_firmware:2.1.0:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_650_firmware:2.1.0:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:pwc600_firmware:1.0.1.1:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_650_firmware:1.0.0:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_670_firmware:2.0.0:*:*:*:*:*:*:* cpe:2.3:h:hitachienergy:relion_670:-:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_670_firmware:2.2.5:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:pwc600_firmware:1.0.1.3:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_670_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_650_firmware:2.2.5:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_650_firmware:2.2.0:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_650_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:h:hitachienergy:gms600:-:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_670_firmware:2.2.1:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_sam600-io_firmware:2.2.5:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:relion_650_firmware:1.2.0:*:*:*:*:*:*:* cpe:2.3:o:hitachienergy:pwc600_firmware:1.1.0.1:*:*:*:*:*:*:* cpe:2.3:h:hitachienergy:relion_650:-:*:*:*:*:*:*:* |
Information
Published : 2021-11-18 17:15
Updated : 2023-04-19 15:32
NVD link : CVE-2021-35534
Mitre link : CVE-2021-35534
JSON object : View
Products Affected
hitachienergy
- relion_670_firmware
- gms600_firmware
- relion_650
- relion_sam600-io
- gms600
- pwc600_firmware
- relion_650_firmware
- relion_sam600-io_firmware
- pwc600
- relion_670
CWE
CWE-269
Improper Privilege Management