OTPulse

Siemens SIPROTEC and SICAM

Act Now9ICS-CERT ICSA-25-135-05May 13, 2025
Attack VectorNetwork
Auth RequiredNone
ComplexityHigh
User InteractionNone needed
Summary

CVE-2024-3596 ("Blastradius") is a vulnerability in the RADIUS authentication protocol affecting Siemens SIPROTEC protective relays, SICAM power measurement and grid automation systems, CPC/CPCI central processors, and related products. An on-path attacker positioned between a RADIUS client device and the authentication server can forge RADIUS response packets to convert authentication rejections into acceptances, granting network access without valid credentials. This could allow an attacker to access and control protective relays, power meters, and grid automation systems that rely on RADIUS for network authentication. Siemens has released patched versions for most affected products and recommends immediate implementation of network segmentation for RADIUS traffic and configuration of Message-Authenticator attributes on the RADIUS server for products without available fixes.

What this means
What could happen
An attacker positioned between a SIPROTEC or SICAM device and its RADIUS authentication server could forge authentication responses to gain network access without valid credentials, potentially allowing unauthorized control of protective relays, power meters, and grid automation systems.
Who's at risk
Electric utilities and grid operators using Siemens SIPROTEC protective relays, SICAM power meter systems, SICAM GridPass, or CPC/CPCI central processing/communication modules for distribution and transmission automation. This affects all major Siemens protection and automation devices used in substations and grid control centers.
How it could be exploited
The attacker must be on the network path between the RADIUS client (e.g., a SICAM device) and the RADIUS server. They intercept RADIUS Access-Request packets, modify the server response to change "Access-Reject" to "Access-Accept", and the affected device grants network access with the attacker's desired privileges without requiring valid credentials.
Prerequisites
  • Network position between RADIUS client and server (on-path attacker)
  • RADIUS protocol in use for device authentication
  • Access to RADIUS traffic (same network segment or compromised network infrastructure)
  • Target device running vulnerable firmware version
remotely exploitable via network pathno authentication credentials required for exploitationaffects critical protection relays that control power flow and grid stabilityPowerlink IP has no fix availablehigh CVSS score (9.0) indicating severe impact
Exploitability
High exploit probability (EPSS 23.8%)
Affected products (53)
52 with fix1 pending
ProductAffected VersionsFix Status
CPC80 Central Processing/Communication< 16.5116.51
CPCI85 Central Processing/Communication< 6.206.20
POWER METER SICAM Q100 family< 2.702.70
POWER METER SICAM Q200 family< 2.832.83
Powerlink IPAll versionsNo fix yet
Remediation & Mitigation
0/19
Do now
0/2
WORKAROUNDRestrict RADIUS traffic to a dedicated management network or VLAN, isolating it from general operational network segments
WORKAROUNDConfigure RADIUS server to require Message-Authenticator attribute in all Access-Request packets from RADIUS client devices that support it
Schedule — requires maintenance window
0/15

Patching may require device reboot — plan for process interruption

POWER METER SICAM Q100 family
HOTFIXUpdate POWER METER SICAM Q100 family to version 2.70 or later
POWER METER SICAM Q200 family
HOTFIXUpdate POWER METER SICAM Q200 family to version 2.83 or later
SICAM GridPass
HOTFIXUpdate SICAM GridPass to version 2.50 or later
SICORE Base system
HOTFIXUpdate SICORE Base system to version 2.20.0 or later
SIPROTEC 5 6MD84 (CP300)
HOTFIXUpdate SIPROTEC 5 6MD84 (CP300) to version 10.0 or later
HOTFIXUpdate SIPROTEC 5 6MD85, 6MD86, 6MD89 (CP300) to version 10.0 or later, or 9.68 for 6MD89 V9.6x
HOTFIXUpdate SIPROTEC 5 6MU85 (CP300) to version 10.0 or later
HOTFIXUpdate SIPROTEC 5 7KE85, 7SA86, 7SA87, 7SD86, 7SD87, 7SJ85, 7SJ86, 7SK85, 7SL86, 7SL87, 7SS85, 7ST85, 7ST86, 7SX85, 7UM85, 7UT85, 7UT86, 7UT87, 7VE85, 7VK87, 7VU85 (CP300) to version 10.0 or later
HOTFIXUpdate SIPROTEC 5 7ST85 (CP300) V9.6x to version 9.68 or later
HOTFIXUpdate SIPROTEC 5 7ST86 (CP300) to version 9.83 or later
SIPROTEC 5 7SA82 (CP100)
HOTFIXUpdate SIPROTEC 5 7SA82, 7SD82, 7SJ81, 7SJ82, 7SK82, 7SL82, 7UT82 (CP100) to version 8.90 or later
SIPROTEC 5 7SA82 (CP150)
HOTFIXUpdate SIPROTEC 5 7SA82, 7SD82, 7SJ81, 7SJ82, 7SK82, 7SL82, 7SX82, 7SY82, 7UT82 (CP150) to version 10.0 or later
SIPROTEC 5 Compact 7SX800 (CP050)
HOTFIXUpdate SIPROTEC 5 Compact 7SX800 (CP050) to version 10.0 or later
All products
HOTFIXUpdate CPC80 to version 16.51 or later
HOTFIXUpdate CPCI85 to version 6.20 or later
Long-term hardening
0/2
HARDENINGImplement network segmentation to protect device access using firewalls and access control lists
HARDENINGReview and apply Siemens operational guidelines for industrial security and device manual recommendations for protected IT environment configuration
↑↓ Navigate · Esc Close
API: /api/v1/advisories/5090d914-e929-464c-aad4-486a43afed38
Siemens SIPROTEC and SICAM | CVSS 9 - OTPulse