RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products
CVE-2024-3596 is a RADIUS protocol vulnerability ("Blastradius") affecting Siemens power grid devices. An on-path attacker between a RADIUS client (such as SIPROTEC relay or SICAM gateway) and RADIUS server can forge authentication packets to convert authentication rejections into acceptances. This allows unauthorized users to gain network access to protection relays and control devices without knowing legitimate credentials, potentially enabling them to issue commands that alter protection settings or disrupt power system operations. The vulnerability requires the attacker to be positioned between the device and its authentication server (Layer 2 or Layer 3), and affects devices that use RADIUS for network access control.
- Network position between the affected device and RADIUS server (same network segment or compromised upstream router)
- RADIUS authentication must be configured on the affected device
- Attacker must be able to send and intercept packets on the network path (Layer 2 or Layer 3 depending on configuration)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/21e55b24-f500-4912-9a2d-2d7197595276