Siemens SIPROTEC 5 Devices
SIPROTEC 5 protection relays contain a vulnerability in TLS secure client-initiated renegotiation handling (CWE-400). An unauthenticated attacker with network access to the device's secure communication port (443/TCP or 4443/TCP) can trigger inefficient renegotiation processing, causing the device to become unresponsive and unable to execute protection commands (trip signals, relay logic) for the duration of the attack. This is a denial-of-service condition affecting the secondary protection layer. The vulnerability is caused by improper handling of TLS renegotiation requests, allowing resource exhaustion. Siemens has released firmware updates for most CP300 and CP150 variants, but CP200 module devices in several product lines have no fix available and must rely on network access controls.
- Network access to port 443/TCP or 4443/TCP
- No authentication required
- Device must be reachable on the network (not air-gapped)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/16ccc276-7374-4a9e-aa9e-5ad47fcec0ed