Siemens SIPROTEC 5
SIPROTEC 5 devices store sensitive data in on-board flash memory without encryption. This allows an attacker with physical access to extract unencrypted information from the device's filesystem, potentially revealing passwords, keys, or configuration data. Affected product variants include all versions of 6MD, 6MU, 7K, 7S, 7U, and 7V series protection relays across multiple processor card options (CP050, CP100, CP150, CP200, CP300). Siemens is developing firmware updates with flash memory encryption but has not yet released fixes. The company recommends network segmentation, physical security, and redundant protection schemes as interim controls.
- Physical access to the SIPROTEC 5 device
- Ability to remove or probe on-board flash memory chip
- Flash memory extraction tools or equipment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3008171f-341f-44e5-a395-0247b79a1decGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.