Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-22283


Improper Initialization vulnerability in ABB Relion protection relays - 611 series, ABB Relion protection relays - 615 series IEC 4.0 FP1, ABB Relion protection relays - 615 series CN 4.0 FP1, ABB Relion protection relays - 615 series IEC 5.0, ABB Relion protection relays - 615 series IEC 5.0 FP1, ABB Relion protection relays - 620 series IEC/CN 2.0, ABB Relion protection relays - 620 series IEC/CN 2.0 FP1, ABB Relion protection relays - REX640 PCL1, ABB Relion protection relays - REX640 PCL2, ABB Relion protection relays - REX640 PCL3, ABB Relion protection relays - RER615, ABB Remote Monitoring and Control - REC615, ABB Merging Unit- SMU615 allows Communication Channel Manipulation.This issue affects Relion protection relays - 611 series: from 1.0.0 before 2.0.3; Relion protection relays - 615 series IEC 4.0 FP1: from 4.1.0 before 4.1.9; Relion protection relays - 615 series CN 4.0 FP1: from 4.1.0 before 4.1.8; Relion protection relays - 615 series IEC 5.0: from 5.0.0 before 5.0.12; Relion protection relays - 615 series IEC 5.0 FP1: from 5.1.0 before 5.1.20; Relion protection relays - 620 series IEC/CN 2.0: from 2.0.0 before 2.0.11; Relion protection relays - 620 series IEC/CN 2.0 FP1: from 2.1.0 before 2.1.15; Relion protection relays - REX640 PCL1: from 1.0.0 before 1.0.8; Relion protection relays - REX640 PCL2: from 1.1.0 before 1.1.4; Relion protection relays - REX640 PCL3: from 1.2.0 before 1.2.1; Relion protection relays - RER615: from 2.0.0 before 2.0.3; Remote Monitoring and Control - REC615: from 1.0.0 before 2.0.3; Merging Unit- SMU615: from 1.0.0 before 1.0.2.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 6.2, requiring local system access to exploit with relatively low complexity without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts and availability (service disruption) for affected systems. Impacting 38 products from abb, from abb, from abb and 35 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2023, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2023-02-28T05:15:12.260

Last Modified

2024-11-21T05:49:50.640

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.2 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-665
  • Type: Primary
    CWE-665

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System abb smu615_firmware < 1.0.2 Yes
Hardware abb smu615 - No
Operating System abb rec615_firmware < 2.0.3 Yes
Hardware abb rec615 - No
Operating System abb rer615_firmware < 2.0.3 Yes
Hardware abb rer615 - No
Operating System abb evd4_firmware * Yes
Hardware abb evd4 - No
Operating System abb ref615r_firmware * Yes
Hardware abb ref615r - No
Operating System abb rex640_pcl3_firmware < 1.2.1 Yes
Hardware abb rex640_pcl3 - No
Operating System abb rex640_pcl2_firmware < 1.1.4 Yes
Hardware abb rex640_pcl2 - No
Operating System abb rex640_pcl1_firmware < 1.0.8 Yes
Hardware abb rex640_pcl1 - No
Operating System abb rer620_firmware * Yes
Hardware abb rer620 - No
Operating System abb relion_611_firmware < 2.0.3 Yes
Hardware abb relion_611 - No
Operating System abb ref615_iec_firmware * Yes
Hardware abb ref615_iec 1.0 No
Operating System abb ref615_ansi_firmware * Yes
Hardware abb ref615_ansi 1.0 No
Operating System abb ref615_iec_firmware * Yes
Hardware abb ref615_iec 1.1 No
Operating System abb red615_iec_firmware * Yes
Hardware abb red615_iec 1.1 No
Operating System abb ref615_ansi_firmware * Yes
Hardware abb ref615_ansi 1.1 No
Operating System abb relion_615_iec_firmware * Yes
Hardware abb relion_615_iec 2.0 No
Hardware abb relion_615_iec 3.0 No
Hardware abb relion_615_iec 4.0 No
Operating System abb relion_615_cn_firmware * Yes
Hardware abb relion_615_cn 2.0 No
Hardware abb relion_615_cn 3.0 No
Hardware abb relion_615_cn 3.1 No
Hardware abb relion_615_cn 4.0 No
Hardware abb relion_615_cn 5.0 No
Operating System abb relion_615_ansi_firmware * Yes
Hardware abb relion_615_ansi 2.0 No
Hardware abb relion_615_ansi 4.0 No
Hardware abb relion_615_ansi 4.0 No
Hardware abb relion_615_ansi 4.0 No
Hardware abb relion_615_ansi 5.0 No
Operating System abb relion_615_iec_firmware < 4.1.9 Yes
Hardware abb relion_615_iec 4.0 No
Operating System abb relion_615_cn_firmware < 4.1.8 Yes
Hardware abb relion_615_cn 4.0 No
Operating System abb relion_615_iec_firmware < 5.0.12 Yes
Hardware abb relion_615_iec 5.0 No
Operating System abb relion_615_iec_firmware < 5.1.20 Yes
Hardware abb relion_615_iec 5.0 No
Operating System abb relion_620_iec_firmware < 2.0.11 Yes
Hardware abb relion_620_iec 2.0 No
Operating System abb relion_620_cn_firmware < 2.0.11 Yes
Hardware abb relion_620_cn 2.0 No
Operating System abb relion_620_ansi_firmware * Yes
Hardware abb relion_620_ansi - No
Operating System abb relion_620_iec_firmware < 2.1.15 Yes
Hardware abb relion_620_iec 2.0 No
Operating System abb relion_620_cn_firmware < 2.1.15 Yes
Hardware abb relion_620_cn 2.0 No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For abb's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.