OTPulse

Siemens POWER METER SICAM Q100

Act Now9.1ICS-CERT ICSA-21-350-07Dec 14, 2021
Attack VectorNetwork
Auth RequiredHigh
ComplexityLow
User InteractionNone needed
Summary

POWER METER SICAM Q100 versions below 2.41 contain a memory safety vulnerability (CWE-121) that allows an authenticated attacker with high-privilege credentials to remotely execute arbitrary code on the device via the web interface. The vulnerability has been fixed in version 2.41. No public exploits currently exist, but Siemens has confirmed the issue and released an update.

What this means
What could happen
An attacker with high-level privileges could remotely execute arbitrary code on the meter, potentially disrupting energy metering, billing accuracy, or grid monitoring capabilities in critical infrastructure.
Who's at risk
Energy utilities and power distributors using Siemens POWER METER SICAM Q100 devices for metering, billing, or grid monitoring. This affects organizations that rely on these meters for revenue collection and operational visibility in electric distribution systems.
How it could be exploited
An attacker must first obtain high-level administrative credentials or access to an already-privileged account on the device. Once authenticated, they can exploit a memory safety vulnerability (CWE-121) via the web interface to execute arbitrary code on the meter remotely. The attack requires network access to the web server port.
Prerequisites
  • Network access to the SICAM Q100 web server (typically port 80/443)
  • Valid high-privilege account credentials (administrator-level access)
  • Device running firmware version below 2.41
Remotely exploitableHigh privilege required (reduces immediate risk but requires credential compromise)Memory safety vulnerability (CWE-121)Critical CVSS score 9.1Affects critical infrastructure (energy sector)
Exploitability
Moderate exploit probability (EPSS 2.3%)
Affected products (1)
ProductAffected VersionsFix Status
POWER METER SICAM Q100<V2.412.41
Remediation & Mitigation
0/4
Do now
0/2
WORKAROUNDRestrict network access to the device's web server using firewall rules; apply IP allowlisting if possible
HARDENINGEnforce strong passwords on all privileged accounts (administrator, service, engineering accounts)
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate POWER METER SICAM Q100 to firmware version 2.41 or later
Long-term hardening
0/1
HARDENINGSegment the meter network from untrusted networks; apply defense-in-depth with DMZ or industrial control system-specific firewall
↑↓ Navigate · Esc Close
API: /api/v1/advisories/5755518e-bddc-48a0-a1c6-e43ef47f649d