ICSA-17-187-03F Siemens SIPROTEC 4 and SIPROTEC Compact (Update F)
Multiple input validation and authentication bypass vulnerabilities in Siemens SIPROTEC 4 and SIPROTEC Compact protection relays and merging units allow an unauthenticated attacker to disrupt device operation via crafted network packets. Affected devices include EN100 Ethernet modules (PROFINET IO, Modbus TCP, DNP3 TCP, IEC 104 variants), SIPROTEC Merging Unit 6MU80, and several relay models (7SJ686, 7UT686, 7SD686, 7SJ66). Input validation defects (CWE-20) combined with missing or incorrect authorization checks (CWE-862, CWE-287) allow bypass of access controls without valid credentials.
- Network access to the Ethernet port of the SIPROTEC device
- No credentials required
- Ability to send raw packets on the device's industrial protocol (PROFINET, Modbus TCP, DNP3, or IEC 104)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/96e57383-0f8a-4325-aa96-613ce2f86557Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.