Siemens Energy PLUSCONTROL 1st Gen
PLUSCONTROL 1st Gen secondary protection relay systems contain vulnerabilities (CWE-342) that allow unauthenticated remote modification of protective logic. An attacker can alter relay configurations or disable protection schemes without credentials, impacting grid fault detection and response. All versions are affected with no vendor fix planned. Siemens recommends applying defense-in-depth measures including network segmentation, multi-level redundant protection schemes, VPN access controls, and operational security hardening.
- Network access to the PLUSCONTROL 1st Gen device
- No authentication required
- Device reachable from attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1fb6b7bf-d942-4ed7-88ad-19b7c241330fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.