Siemens RADIUS Client of SIPROTEC 5 Devices
The RADIUS client implementation in SIPROTEC 5 protective relays (based on VxWorks) contains an infinite loop vulnerability that causes a denial of service when the relay receives a specially crafted RADIUS packet from its configured RADIUS server. The affected devices span multiple relay types (distance, overcurrent, differential, earth fault, and field protection relays) running firmware versions V7.80 to V9.29 (depending on model). When triggered, the relay's RADIUS client crashes, rendering the protective relay unavailable until manual restart. Most products are fixed in firmware version 9.30; however, the SIPROTEC 5 6MD89 (CP300) has no patch available.
- Network access to the RADIUS server that the SIPROTEC 5 device authenticates to
- RADIUS authentication configured and enabled on the target SIPROTEC 5 device
- Affected firmware version installed (V7.80 to V9.29, depending on device model)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e0cf4573-0ce6-4664-9ea3-bc66f4fd26f9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.