ICSA-18-347-02 Siemens EN100 Ethernet Communication Module and SIPROTEC 5 Relays (Update A)
The EN100 Ethernet Communication Module and SIPROTEC 5 protective relays contain an improper input validation vulnerability (CWE-20) in their network protocol handlers. When an EN100 module or SIPROTEC 5 relay receives a malformed network packet on ports used for IEC 61850, PROFINET IO, Modbus TCP, DNP3 TCP, or IEC 104 protocols, it fails to validate the input correctly. This causes the affected device to crash or become unresponsive, leading to denial of service. Multiple firmware variants and relay models are affected across various protocol implementations. The vulnerability can be triggered remotely over the network without any authentication or credentials.
- Network access to the EN100 Ethernet module or SIPROTEC 5 relay over TCP/IP on the protocol port (IEC 61850, PROFINET IO, Modbus TCP, DNP3 TCP, or IEC 104)
- No authentication or credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6042b598-b66a-4fe6-aa94-94e8d276dd21Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.