Siemens SIPROTEC 5 and DIGSI 5 (Update C)
SIPROTEC 5 protection and control relays and DIGSI 5 engineering software contain improper input validation flaws in their Ethernet communication modules. An attacker can send a crafted network packet to cause the device to crash or hang, resulting in denial of service. The affected device types span a wide range of SIPROTEC 5 models used in power transmission and distribution. Device types with CP300 and CP100 CPU variants have firmware patches available (v7.90 or v8.01 depending on model). Device types with CP200 variants have patches available up to v7.59. However, many SIPROTEC 5 device models have no available patch and will remain vulnerable. For unpatched devices, the client authorization feature can be activated as a compensating control. Network segmentation to restrict access to SIPROTEC 5 devices is also recommended.
- Network access to the Ethernet port of the SIPROTEC 5 device or DIGSI 5 engineering workstation (port not specified in advisory; assume standard industrial Ethernet access)
- Target device running an affected firmware version
- Device must be reachable from the attacker's network position (internal or external, depending on network architecture)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/45c82f02-1877-48aa-ae15-15c3da7464c2