CVE-2022-1667
Published on: Not Yet Published
Last Modified on: 07/05/2022 03:54:00 PM UTC
Certain versions of Sepcos Control And Protection Relay from Secheron contain the following vulnerability:
Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script
- CVE-2022-1667 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- Affected Vendor/Software:
Secheron - SEPCOS Control and Protection Relay firmware package version < 1.23.21
- Affected Vendor/Software:
Secheron - SEPCOS Control and Protection Relay firmware package version < 1.24.8
- Affected Vendor/Software:
Secheron - SEPCOS Control and Protection Relay firmware package version < 1.25.3
Vulnerability Patch/Work Around
- Additional workarounds are suggested to help reduce the risk: Configure the network such that PLC communications are strictly limited to only the devices required to perform its functions. Limit remote access and close Ports 80 and 443 at the switch level. Only use approved devices to connect to the PLCs. Do not connect personal peripherals (USB sticks, hotspots) to approved devices. Check device logs during periodic maintenance for unauthorized changes or access.
CVSS3 Score: 7.5 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 7.8 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Secheron SEPCOS Control and Protection Relay | CISA | www.cisa.gov text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Hardware | Secheron | Sepcos Control And Protection Relay | - | All | All | All |
Operating System | Secheron | Sepcos Control And Protection Relay Firmware | All | All | All | All |
- cpe:2.3:h:secheron:sepcos_control_and_protection_relay:-:*:*:*:*:*:*:*:
- cpe:2.3:o:secheron:sepcos_control_and_protection_relay_firmware:*:*:*:*:*:*:*:*:
Discovery Credit
Anthony Candarini of AECOM, Clark Bradley of Elliott Davis, Mike Curnow of AECOM, and Balakrishna Subramoney of SAM Analytic Solutions reported these vulnerabilities to CISA.
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-1667 : Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC… twitter.com/i/web/status/1… | 2022-06-24 15:11:56 |
![]() |
Php - CVE-2022-1667: cisa.gov/uscert/ics/adv… | 2022-06-24 17:00:17 |