Siemens SIPROTEC and SICAM
CVE-2024-3596 ("Blastradius") is a vulnerability in the RADIUS authentication protocol affecting Siemens SIPROTEC protective relays, SICAM power measurement and grid automation systems, CPC/CPCI central processors, and related products. An on-path attacker positioned between a RADIUS client device and the authentication server can forge RADIUS response packets to convert authentication rejections into acceptances, granting network access without valid credentials. This could allow an attacker to access and control protective relays, power meters, and grid automation systems that rely on RADIUS for network authentication. Siemens has released patched versions for most affected products and recommends immediate implementation of network segmentation for RADIUS traffic and configuration of Message-Authenticator attributes on the RADIUS server for products without available fixes.
- Network position between RADIUS client and server (on-path attacker)
- RADIUS protocol in use for device authentication
- Access to RADIUS traffic (same network segment or compromised network infrastructure)
- Target device running vulnerable firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5090d914-e929-464c-aad4-486a43afed38