ICSA-19-043-02 Siemens EN100 Ethernet Communication Module and SIPROTEC 5 Relays
The EN100 Ethernet Communication Module and SIPROTEC 5 relays contain an improper input validation flaw in their network protocol handlers (IEC 61850, MODBUS TCP, DNP3 TCP, IEC 60870-5-104, and PROFINET IO). A malformed packet sent to the device on its configured protocol port can crash the Ethernet communication module, causing loss of communication and protection relay function. The vulnerability affects firmware versions before V4.35 for EN100 (IEC 61850 variant), all firmware versions of EN100 (MODBUS TCP, DNP3 TCP, IEC 104, and PROFINET IO variants), and SIPROTEC 5 relays with CP300/CP100 before V7.82 and CP200 before V7.58.
- Network access to the EN100 Ethernet module or SIPROTEC 5 relay on the configured protocol port
- Device must be deployed and in-service on the network
- No authentication or credentials required to send the malformed packet
Patching may require device reboot — plan for process interruption
/api/v1/advisories/79489dca-67c6-45be-ab85-31eb6d9a661dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.