CVE Vulnerabilities

CVE-2022-3353

Improper Resource Shutdown or Release

Published: Feb 21, 2023 | Modified: Nov 07, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A vulnerability exists in the IEC 61850 communication stack that affects multiple Hitachi Energy products. 

An attacker could exploit the vulnerability by using a specially crafted message sequence, to force the IEC 61850 MMS-server communication stack, to stop accepting new MMS-client connections. 

Already existing/established client-server connections are not affected.

List of affected CPEs:

  • cpe:2.3:o:hitachienergy:fox61x_tego1:r15b08:::::::*
  • cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16_3:::::::*
  • cpe:2.3:o:hitachienergy:fox61x_tego1:r2a16:::::::*
  • cpe:2.3:o:hitachienergy:fox61x_tego1:r1e01:::::::*
  • cpe:2.3:o:hitachienergy:fox61x_tego1:r1d02:::::::*
  • cpe:2.3:o:hitachienergy:fox61x_tego1:r1c07:::::::*
  • cpe:2.3:o:hitachienergy:fox61x_tego1:r1b02:::::::*
  • cpe:2.3:a:hitachienergy:gms600:1.3.0:::::::*
  • cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.1.:::::::
  • cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.5.:::::::
  • cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0:::::::*
  • cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.6.0.1:::::::*
  • cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.0:::::::*
  • cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.7.2:::::::*
  • cpe:2.3:a:hitachienergy:itt600_sa_explorer:1.8.0:::::::*
  • cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.0.:::::::
  • cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.4:::::::*
  • cpe:2.3:a:hitachienergy:itt600_sa_explorer:2.1.0.5:::::::*
  • cpe:2.3:a:hitachienergy:microscada_x_sys600:10:::::::*
  • cpe:2.3:a:hitachienergy:microscada_x_sys600:10.:::::::
  • cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2:::::::*
  • cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2.1:::::::*
  • cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3:::::::*
  • cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3.1:::::::*
  • cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4:::::::*
  • cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4.1:::::::*
  • cpe:2.3:a:hitachienergy:mms:2.2.3:::::::*
  • cpe:2.3:a:hitachienergy:pwc600:1.0:::::::*
  • cpe:2.3:a:hitachienergy:pwc600:1.1:::::::*
  • cpe:2.3:a:hitachienergy:pwc600:1.2:::::::*
  • cpe:2.3:o:hitachienergy:reb500:7::::::::
  • cpe:2.3:o:hitachienergy:reb500:8:::::::*
  • cpe:2.3:o:hitachienergy:relion670:1.2.:::::::
  • cpe:2.3:o:hitachienergy:relion670:2.0.:::::::
  • cpe:2.3:o:hitachienergy:relion650:1.1.:::::::
  • cpe:2.3:o:hitachienergy:relion650:1.3.:::::::
  • cpe:2.3:o:hitachienergy:relion650:2.1.:::::::
  • cpe:2.3:o:hitachienergy:relion670:2.1.:::::::
  • cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.1:::::::*
  • cpe:2.3:o:hitachienergy:relionSAM600-IO:2.2.5:::::::*
  • cpe:2.3:o:hitachienergy:relion670:2.2.:::::::
  • cpe:2.3:o:hitachienergy:relion650:2.2.:::::::
  • cpe:2.3:o:hitachienergy:rtu500cmu:12..:::::::*
  • cpe:2.3:a:hitachienergy:rtu500cmu:13..:::::::*
  • cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:2.:::::::
  • cpe:2.3:a:hitachienergy:txpert_hub_coretec_4:3.0:::::::*
  • cpe:2.3:a:hitachienergy:txpert_hub_coretec_5:3.0:::::::*

Weakness

The product does not release or incorrectly releases a resource before it is made available for re-use.

Affected Software

Name Vendor Start Version End Version
Sys600_firmware Hitachienergy 10.1 (including) 10.3.1 (including)

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, languages such as Java, Ruby, and Lisp perform automatic garbage collection that releases memory for objects that have been deallocated.

References