Siemens SIPROTEC 5
A sensitive data exposure vulnerability in SIPROTEC 5 protective relay devices allows an attacker to retrieve sensitive session data from browser history, logs, or other storage mechanisms, potentially leading to unauthorized access. The vulnerability affects all versions of SIPROTEC 5 protective relays across multiple models (6MD, 6MU, 7KE, 7SA, 7SD, 7SJ, 7SK, 7SL, 7SS, 7ST, 7SX, 7SY, 7UM, 7UT, 7UE, 7VK, 7VU models with CP100, CP150, CP300, and CP050 processor modules). Siemens is preparing fix versions for affected products.
- Network access to the SIPROTEC 5 web management interface (typically HTTP/HTTPS port 80/443)
- Ability to view or extract browser history, logs, or storage data from the affected device or a user's management workstation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/efd204be-4ea2-4547-a04d-ac1e3ad256a5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.