Siemens SIPROTEC 4, SIPROTEC Compact, DIGSI 4, and EN100 Ethernet Module (Update D)
SIPROTEC 4 and SIPROTEC Compact protective relays, along with EN100 Ethernet communication modules, contain a vulnerability in their engineering authentication mechanism. The DIGSI 4 engineering software and associated EN100 modules use a weak password protection scheme that allows an attacker to reconstruct or overwrite access authorization passwords through specially crafted engineering protocol messages. An attacker with network access to the relay or module can extract the engineering password without providing valid credentials, then use that password to remotely reconfigure relay protection logic, modify setpoints, or disable the relay entirely. The vulnerability affects all versions of several relay models and all variants of some EN100 modules, with no firmware fix available for EN100 IEC 104, Modbus TCP, PROFINET IO variants, and legacy SIPROTEC 4 and Compact relays.
- Network access to Ethernet port 502 (Modbus TCP) or the applicable IEC 104/61850/DNP3/PROFINET port on the SIPROTEC relay or EN100 module
- DIGSI 4 engineering software available to the attacker (or ability to send raw DIGSI 4 protocol frames)
- Target device must be running a vulnerable firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/51ad38c6-bdf2-4c46-a952-9d86f691ebab