ICSA-18-067-02_Siemens SIPROTEC 4, SIPROTEC Compact, and Reyrolle Devices using the EN100 Ethernet Communication Module Extension (Update B)
Siemens EN100 Ethernet modules used in SIPROTEC 4, SIPROTEC Compact, and Reyrolle protective relays lack authentication on network commands. The modules accept unauthenticated configuration and control commands over the network, allowing unauthorized modification of relay settings and operation. The vulnerability affects all five communication protocol variants: PROFINET IO, IEC 104, DNP3, IEC 61850, and Modbus TCP. Protective relays are critical to substation protection and grid stability; unauthorized command execution could disrupt load shedding, breaker control, or other automated protective functions.
- Network access to the EN100 module's communication port (PROFINET, IEC 104, DNP3, IEC 61850, or Modbus TCP depending on variant)
- Device must be reachable from the attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bf9d2c11-a8bf-4852-9c16-df35f7c71f9dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.