Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28766: CWE-476: NULL Pointer Dereference in Siemens SIPROTEC 5 6MD85 (CP300)

0
High
VulnerabilityCVE-2023-28766cvecve-2023-28766cwe-476
Published: Tue Apr 11 2023 (04/11/2023, 09:03:05 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: SIPROTEC 5 6MD85 (CP300)

Description

A vulnerability has been identified in SIPROTEC 5 6MD85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 6MD89 (CP300) (All versions >= V7.80 < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7KE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA82 (CP100) (All versions < V8.90), SIPROTEC 5 7SA82 (CP150) (All versions < V9.40), SIPROTEC 5 7SA86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SA87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD82 (CP100) (All versions < V8.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.40), SIPROTEC 5 7SD86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SD87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.40), SIPROTEC 5 7SJ85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SJ86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.40), SIPROTEC 5 7SK85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL82 (CP100) (All versions < V8.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.40), SIPROTEC 5 7SL86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SL87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SS85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7ST85 (CP300) (All versions >= V7.80 < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7SX82 (CP150) (All versions < V9.40), SIPROTEC 5 7SX85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UM85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT82 (CP100) (All versions < V8.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.40), SIPROTEC 5 7UT85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT86 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7UT87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VE85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VK87 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 7VU85 (CP300) (All versions >= V7.80 < V9.40), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V9.40 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V9.40 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.40), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.40). Affected devices lack proper validation of http request parameters of the hosted web service. An unauthenticated remote attacker could send specially crafted packets that could cause denial of service condition of the target device.

AI-Powered Analysis

AILast updated: 11/11/2025, 21:01:21 UTC

Technical Analysis

CVE-2023-28766 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting Siemens SIPROTEC 5 series devices, including protection relays and communication modules across multiple models (e.g., 6MD85, 7SA82, 7SJ81, 7SX82, and others) and firmware versions ranging approximately from V7.80 up to but not including various fixed versions (e.g., V9.40, V9.64). The root cause is insufficient validation of HTTP request parameters in the embedded web services hosted by these devices. This flaw allows an unauthenticated remote attacker to send specially crafted HTTP packets that trigger a NULL pointer dereference, causing the device to crash or become unresponsive, resulting in a denial of service (DoS). The vulnerability does not affect confidentiality or integrity but severely impacts availability, which is critical for devices used in power system protection and control. The CVSS v3.1 base score is 7.5 (high), reflecting the ease of exploitation (network accessible, no privileges or user interaction required) and the significant impact on availability. No known exploits are reported in the wild yet, but the broad range of affected devices and their critical operational role make this a high-risk issue. Siemens has published advisories and firmware updates to address this vulnerability, though patch deployment in operational environments may be challenging due to the critical nature of these devices. Network segmentation and access controls are recommended as interim protective measures.

Potential Impact

The primary impact of CVE-2023-28766 is the denial of service of Siemens SIPROTEC 5 devices, which are widely deployed in electrical power grids for protection, automation, and control. For European organizations, especially utilities and grid operators, this vulnerability could lead to temporary loss of critical protection functions, potentially causing power outages, equipment damage, or grid instability. The inability to respond to faults or abnormal conditions due to device unavailability could increase the risk of cascading failures in the power network. Given the essential role of these devices in maintaining grid reliability and safety, exploitation could disrupt energy supply to large populations and critical infrastructure. Furthermore, the unauthenticated nature of the attack vector means that threat actors could attempt remote DoS attacks without needing insider access. This elevates the risk profile for European energy sectors, which are increasingly targeted by sophisticated cyber adversaries. Operational disruptions could also have regulatory and financial consequences for affected organizations.

Mitigation Recommendations

1. Immediate deployment of Siemens-provided firmware updates to all affected SIPROTEC 5 devices is the most effective mitigation. Organizations should verify device versions and apply patches as soon as possible. 2. Implement strict network segmentation to isolate SIPROTEC devices from general IT networks and restrict access to management interfaces to trusted personnel and systems only. 3. Employ firewall rules and intrusion prevention systems (IPS) to block unauthorized HTTP requests to the devices, especially from untrusted or external networks. 4. Monitor network traffic for anomalous HTTP requests targeting SIPROTEC devices to detect potential exploitation attempts early. 5. Use VPNs or secure management channels for remote access to SIPROTEC devices to reduce exposure. 6. Conduct regular audits of device firmware versions and configurations to ensure compliance with security policies. 7. Develop and test incident response plans specific to protection relay failures to minimize operational impact in case of exploitation. 8. Coordinate with Siemens support and cybersecurity teams for guidance and updates on vulnerability management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2023-03-23T09:09:31.711Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6913a08cf4d5bbdab5b1c772

Added to database: 11/11/2025, 8:46:04 PM

Last enriched: 11/11/2025, 9:01:21 PM

Last updated: 12/9/2025, 1:02:22 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats