Gain insights into CVE-2022-1667 affecting Secheron's SEPCOS Control and Protection Relay firmware package. Learn about the impact, technical details, and mitigation steps.
A detailed analysis of CVE-2022-1667 focusing on the Secheron SEPCOS Control and Protection Relay vulnerability.
Understanding CVE-2022-1667
This CVE pertains to vulnerabilities found in the SEPCOS Control and Protection Relay firmware package by Secheron, impacting certain versions of the software.
What is CVE-2022-1667?
The vulnerability allows bypassing client-side JavaScript controls by directly running a JavaScript function to reboot the Programmable Logic Controller (PLC) or by loading a particular PHP script accessible via the browser console.
The Impact of CVE-2022-1667
With a CVSS base score of 7.5, this vulnerability poses a high risk by potentially enabling unauthorized rebooting of the PLC, leading to availability issues.
Technical Details of CVE-2022-1667
Taking a closer look at the technical aspects of the vulnerability.
Vulnerability Description
The flaw allows for the bypass of client-side JavaScript controls, presenting a significant risk of PLC reboot by executing specific functions.
Affected Systems and Versions
All versions of SEPCOS Control and Protection Relay firmware package with a version less than 1.23.21 are vulnerable.
Exploitation Mechanism
The vulnerability can be exploited by directly running a JS function or loading a specific PHP script via the browser console.
Mitigation and Prevention
Guidelines on how to mitigate and prevent potential exploitation of CVE-2022-1667.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Secheron suggests updating the SEPCOS Single Package firmware to the latest versions based on the feature level to address the vulnerability.