Siemens SIPROTEC and SICAM
CVE-2024-3596 ("Blastradius") is a RADIUS protocol vulnerability affecting SIPROTEC and SICAM authentication. An on-path attacker located between a SIPROTEC/SICAM device and its RADIUS authentication server can forge Access-Request and Access-Accept packets to bypass credential validation. This allows the attacker to gain network access and system authorization without knowing legitimate credentials, potentially enabling unauthorized control of protective relays and power management functions. Siemens has released patched versions for most affected products and recommends isolating RADIUS traffic to protected networks and configuring RADIUS servers to require Message-Authenticator attributes as interim mitigations.
- Network access to RADIUS traffic between the device and authentication server (man-in-the-middle position)
- Device must be configured to use RADIUS authentication
- RADIUS server must not require Message-Authenticator attribute in Access-Request packets
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5090d914-e929-464c-aad4-486a43afed38Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.