OTPulse

Remote Code Execution Vulnerability in POWER METER SICAM Q100

Act Now9.1SSA-496292Dec 14, 2021
Attack VectorNetwork
Auth RequiredHigh
ComplexityLow
User InteractionNone needed
Summary

POWER METER SICAM Q100 contains a remote code execution vulnerability (CWE-121) that could allow an attacker to execute arbitrary code on the device. Versions prior to V2.41 are affected.

What this means
What could happen
An attacker with high privileges could execute arbitrary code on the power meter, potentially altering metering data, disrupting billing accuracy, or affecting grid monitoring and control functions.
Who's at risk
Energy sector organizations operating Siemens POWER METER SICAM Q100 devices should prioritize this patch. Affected systems include power metering infrastructure, billing systems, and grid measurement points in electrical utilities and distributed energy facilities.
How it could be exploited
An attacker with high-level credentials or administrator access could exploit this vulnerability to execute code on the SICAM Q100 device. The vulnerability is accessible over the network.
Prerequisites
  • Administrative or high-privilege credentials for the POWER METER SICAM Q100
  • Network access to the device management interface
  • Authentication required (high privilege level)
remotely exploitablecritical severity (CVSS 9.1)affects billing and metering systemsrequires high privileges to exploit
Exploitability
Moderate exploit probability (EPSS 2.3%)
Affected products (1)
ProductAffected VersionsFix Status
POWER METER SICAM Q100< V2.412.41
Remediation & Mitigation
0/3
Do now
0/2
HARDENINGRestrict administrative access to the POWER METER SICAM Q100 management interface to authorized personnel only
HARDENINGMonitor and audit administrative access logs on affected devices for unauthorized access attempts
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate POWER METER SICAM Q100 to firmware version 2.41 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/d6a73552-0d73-4727-94c0-491cbd40fbdc
Remote Code Execution Vulnerability in POWER METER SICAM Q100 | CVSS 9.1 - OTPulse