Siemens SIPROTEC 5 relays (Update A)
A buffer overflow vulnerability (CWE-120) in SIPROTEC 5 relays with CPU variants CP050, CP100, and CP300 running firmware versions below 8.80 allows remote attackers to trigger denial-of-service or potential remote code execution by sending crafted packets to port 4443/TCP. No authentication is required. Siemens has released firmware version 8.80 or later to fix the vulnerabilities. The advisory notes that public exploits are not yet known, and operators are recommended to apply security updates and implement network segmentation to minimize the risk.
- Network access to port 4443/TCP on the SIPROTEC 5 relay
- No authentication required
- Vulnerable firmware version (below 8.80 on any CP050, CP100, or CP300 variant)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8722a236-dbcd-447f-a1c1-395595e958b3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.