Siemens SIPROTEC
The SIPROTEC 5 protection relays and communication modules implement weak encryption algorithms in their web interface (port 443), DIGSI 5 engineering client communications (port 4443), and syslog-over-TLS functionality. An attacker positioned on the network between a client and the device could decrypt and read plaintext data including configuration, operational parameters, and potentially credentials. Siemens has released firmware updates for most product variants to strengthen encryption. For CP200 variants and some older models, fixes are not planned or not yet available.
- Network access to the SIPROTEC 5 device from the path between client and relay (man-in-the-middle position)
- Access to traffic on ports 443/tcp, 4443/tcp, or configurable syslog-over-TLS port
- Client software (DIGSI 5 workstation or web browser) actively communicating with the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/930666f8-c9a1-4782-b551-59d8d896a23aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.