Siemens Third-Party Component in SICAM and SITIPE Products
A buffer overflow vulnerability exists in the IEC 61850 Client library from Triangle MicroWorks, which is used by multiple Siemens substation automation products. An unauthenticated remote attacker can send specially crafted MMS (Manufacturing Message Specification) messages over the network to trigger the overflow, causing the affected component to crash and become unavailable. The vulnerability affects: ET85 Ethernet Interface IEC61850 (versions before 03.27), ETI5 Ethernet Interface 1x100TX IEC61850 (versions before 05.30), SICAM SCC (versions before 9.14 HF2), and SITIPE AT (versions before 3.21). The affected products are used in SICAM A8000, SICAM EGS, SICAM S8000 device firmware, and SITIPE AT protection systems for substation control and protection applications.
- - Network access to the affected device or application on the IEC 61850 communication port (typically 102/tcp) - No authentication or valid credentials required - Device must be operational and listening for MMS messages
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1f35b81c-fb62-4d84-bb48-29d1b42476ef