Software catalogue for Hitachi ABB Power Grids

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Hitachi ABB Power Grids

Software catalogue for Hitachi ABB Power Grids

AFS660 AFS660-SR AFS665 AFS665-SR Counterparty Settlement and Billing (CSB) Ellipse APM Ellipse EAM
FOX615 Retail Operations SDM600 TropOS


Latest security bulletins

Secuity bulletin Severity Status Published
SB2025010865: Multiple vulnerabilities in Hitachi Energy SDM600 Low
Patched
08.01.2025
SB2022042703: Multiple vulnerabilities in Hitachi Energy SDM600 Medium
Patched
27.04.2022
SB2021120104: Improper access control in Hitachi Energy Retail Operations and CSB Software Low
Patched
01.12.2021
SB2021090803: Cleartext storage of sensitive information in Hitachi ABB Power Grids System Data Manager Low
Patched
08.09.2021
SB2021082505: Insufficiently protected credentials in Hitachi ABB Power Grids Retail Operations and CSB Products Low
Patched
25.08.2021
SB2021082503: Multiple vulnerabilities in Hitachi ABB Power Grids TropOS Low
Patched
25.08.2021
SB2021042145: Stored cross-site scripting in Hitachi ABB Power Grids Ellipse APM Low
Patched
21.04.2021
SB2021031710: Denial of service in Hitachi ABB Power Grids AFS Series Low
Patched
17.03.2021
SB2021030310: Multiple vulnerabilities in Hitachi ABB Power Grids Ellipse EAM Medium
Patched
03.03.2021
SB2021010803: Hitachi ABB Power Grids FOX615 Multiservice-Multiplexer update for libssh library Low
Patched
08.01.2021

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or