Siemens SIPROTEC 5
SIPROTEC 5 protection relays contain an unauthenticated development shell accessible via a physical interface on the device. An attacker with physical access can connect to this shell and execute arbitrary commands on the relay firmware without requiring credentials. This affects multiple SIPROTEC 5 relay models and variants across different processor modules (CP050, CP100, CP150, CP200, CP300). Siemens has released firmware updates for relays with CP300, CP150, and CP050 modules, but states no fix is planned for CP200 variants and no fix is currently available for certain CP100 and CP300 models. The vulnerability is classified as CWE-489 (Service Exposure of Unsafe Function).
- Physical access to the SIPROTEC 5 device or its management port
- No credentials or authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e419ec60-0086-4b74-bb19-21682dfdcfb1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.