CVE-2025-1718: CWE-754 Improper Check for Unusual or Exceptional Conditions in Hitachi Energy Relion 670/650 and SAM600-IO
An authenticated user with file access privilege via FTP access can cause the Relion 670/650 and SAM600-IO series device to reboot due to improper disk space management.
AI Analysis
Technical Summary
CVE-2025-1718 is a high-severity vulnerability affecting Hitachi Energy's Relion 670/650 and SAM600-IO series devices, which are widely used in electrical grid protection and automation systems. The vulnerability arises from improper handling of disk space management, specifically an improper check for unusual or exceptional conditions (CWE-754). An authenticated user with file access privileges via FTP can exploit this flaw to cause the affected device to reboot unexpectedly. This reboot is triggered by the device's failure to properly manage disk space, potentially due to unhandled edge cases or insufficient validation of disk usage conditions. The vulnerability requires no user interaction beyond the authenticated FTP access, and no additional privileges beyond file access are necessary. The CVSS 4.0 vector (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates that the attack can be performed remotely over the network with low attack complexity and no user interaction, requiring only low privileges (file access). The impact is primarily on availability, as the device reboot disrupts normal operation, which in critical infrastructure environments can lead to service interruptions or degraded system performance. No known exploits are currently reported in the wild, but the vulnerability's nature and the critical role of these devices in power grid management make it a significant concern. The affected versions span multiple releases, indicating a long-standing issue that requires patching or mitigation.
Potential Impact
For European organizations, particularly those involved in energy production, transmission, and distribution, this vulnerability poses a significant risk to operational continuity. Relion 670/650 and SAM600-IO devices are integral to grid protection and automation, and unexpected reboots can cause temporary loss of monitoring and control capabilities. This can lead to delayed fault detection, potential equipment damage, and in worst cases, cascading failures affecting large portions of the electrical grid. The disruption could impact critical infrastructure, including hospitals, transportation, and industrial facilities, thereby affecting public safety and economic stability. Given the increasing focus on smart grids and digitalization in Europe, the availability of these devices is paramount. Attackers exploiting this vulnerability could cause denial-of-service conditions remotely, potentially as part of a broader attack campaign targeting energy infrastructure. The fact that exploitation requires only authenticated FTP access means that insider threats or compromised credentials could be leveraged to trigger the reboot, increasing the attack surface. The absence of known exploits in the wild suggests that proactive mitigation can prevent exploitation, but the high severity score underscores the urgency of addressing this vulnerability.
Mitigation Recommendations
1. Restrict FTP access strictly: Limit FTP access to trusted administrators and secure it using network segmentation and firewall rules to prevent unauthorized access. 2. Implement strong authentication and credential management: Enforce multi-factor authentication for all users with file access privileges and regularly rotate credentials to reduce the risk of compromise. 3. Monitor FTP logs and device behavior: Deploy continuous monitoring to detect unusual FTP activity or unexpected device reboots, enabling rapid incident response. 4. Apply vendor patches or updates promptly once available: Although no patches are currently linked, coordinate with Hitachi Energy for updates or workarounds. 5. Employ compensating controls: If patching is delayed, consider disabling FTP access if operationally feasible or replacing FTP with more secure protocols such as SFTP or FTPS. 6. Conduct regular security audits and vulnerability assessments on critical infrastructure devices to identify and remediate similar issues proactively. 7. Develop and test incident response plans specifically for device reboots and availability disruptions to minimize downtime and operational impact.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Sweden, Belgium, Czech Republic
CVE-2025-1718: CWE-754 Improper Check for Unusual or Exceptional Conditions in Hitachi Energy Relion 670/650 and SAM600-IO
Description
An authenticated user with file access privilege via FTP access can cause the Relion 670/650 and SAM600-IO series device to reboot due to improper disk space management.
AI-Powered Analysis
Technical Analysis
CVE-2025-1718 is a high-severity vulnerability affecting Hitachi Energy's Relion 670/650 and SAM600-IO series devices, which are widely used in electrical grid protection and automation systems. The vulnerability arises from improper handling of disk space management, specifically an improper check for unusual or exceptional conditions (CWE-754). An authenticated user with file access privileges via FTP can exploit this flaw to cause the affected device to reboot unexpectedly. This reboot is triggered by the device's failure to properly manage disk space, potentially due to unhandled edge cases or insufficient validation of disk usage conditions. The vulnerability requires no user interaction beyond the authenticated FTP access, and no additional privileges beyond file access are necessary. The CVSS 4.0 vector (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates that the attack can be performed remotely over the network with low attack complexity and no user interaction, requiring only low privileges (file access). The impact is primarily on availability, as the device reboot disrupts normal operation, which in critical infrastructure environments can lead to service interruptions or degraded system performance. No known exploits are currently reported in the wild, but the vulnerability's nature and the critical role of these devices in power grid management make it a significant concern. The affected versions span multiple releases, indicating a long-standing issue that requires patching or mitigation.
Potential Impact
For European organizations, particularly those involved in energy production, transmission, and distribution, this vulnerability poses a significant risk to operational continuity. Relion 670/650 and SAM600-IO devices are integral to grid protection and automation, and unexpected reboots can cause temporary loss of monitoring and control capabilities. This can lead to delayed fault detection, potential equipment damage, and in worst cases, cascading failures affecting large portions of the electrical grid. The disruption could impact critical infrastructure, including hospitals, transportation, and industrial facilities, thereby affecting public safety and economic stability. Given the increasing focus on smart grids and digitalization in Europe, the availability of these devices is paramount. Attackers exploiting this vulnerability could cause denial-of-service conditions remotely, potentially as part of a broader attack campaign targeting energy infrastructure. The fact that exploitation requires only authenticated FTP access means that insider threats or compromised credentials could be leveraged to trigger the reboot, increasing the attack surface. The absence of known exploits in the wild suggests that proactive mitigation can prevent exploitation, but the high severity score underscores the urgency of addressing this vulnerability.
Mitigation Recommendations
1. Restrict FTP access strictly: Limit FTP access to trusted administrators and secure it using network segmentation and firewall rules to prevent unauthorized access. 2. Implement strong authentication and credential management: Enforce multi-factor authentication for all users with file access privileges and regularly rotate credentials to reduce the risk of compromise. 3. Monitor FTP logs and device behavior: Deploy continuous monitoring to detect unusual FTP activity or unexpected device reboots, enabling rapid incident response. 4. Apply vendor patches or updates promptly once available: Although no patches are currently linked, coordinate with Hitachi Energy for updates or workarounds. 5. Employ compensating controls: If patching is delayed, consider disabling FTP access if operationally feasible or replacing FTP with more secure protocols such as SFTP or FTPS. 6. Conduct regular security audits and vulnerability assessments on critical infrastructure devices to identify and remediate similar issues proactively. 7. Develop and test incident response plans specifically for device reboots and availability disruptions to minimize downtime and operational impact.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Hitachi Energy
- Date Reserved
- 2025-02-26T16:05:27.638Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 685a8e7adec26fc862d97548
Added to database: 6/24/2025, 11:39:38 AM
Last enriched: 6/24/2025, 11:54:50 AM
Last updated: 8/13/2025, 4:02:55 PM
Views: 28
Related Threats
CVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumCVE-2025-8720: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in morehawes Plugin README Parser
MediumCVE-2025-8091: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ashanjay EventON – Events Calendar
MediumCVE-2025-8080: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alobaidi Alobaidi Captcha
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.