CVE-2024-38867: CWE-326: Inadequate Encryption Strength in Siemens SIPROTEC 5 6MD84 (CP300)
A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.64), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.64), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.64), SIPROTEC 5 6MD89 (CP300) (All versions < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions < V9.64), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V9.64), SIPROTEC 5 7SA82 (CP100) (All versions < V8.90), SIPROTEC 5 7SA82 (CP150) (All versions < V9.65), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.65), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.65), SIPROTEC 5 7SD82 (CP100) (All versions < V8.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.65), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.65), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.65), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.65), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.65), SIPROTEC 5 7SL82 (CP100) (All versions < V8.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.65), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.65), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.65), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions < V9.64), SIPROTEC 5 7SX82 (CP150) (All versions < V9.65), SIPROTEC 5 7SX85 (CP300) (All versions < V9.65), SIPROTEC 5 7UM85 (CP300) (All versions < V9.64), SIPROTEC 5 7UT82 (CP100) (All versions < V8.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.65), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.65), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.65), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.65), SIPROTEC 5 7VE85 (CP300) (All versions < V9.64), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.65), SIPROTEC 5 7VU85 (CP300) (All versions < V9.64), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.62), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.64). The affected devices are supporting weak ciphers on several ports (443/tcp for web, 4443/tcp for DIGSI 5 and configurable port for syslog over TLS). This could allow an unauthorized attacker in a man-in-the-middle position to decrypt any data passed over to and from those ports.
AI Analysis
Technical Summary
CVE-2024-38867 identifies a cryptographic weakness (CWE-326) in Siemens SIPROTEC 5 series devices, including numerous models such as 6MD84, 6MD85, 7SA82, 7SJ81, 7SL82, 7UT82, and others, as well as associated communication modules (ETH-BA-2EL, ETH-BB-2FO, ETH-BD-2FO). The vulnerability arises from the use of weak encryption ciphers on several TCP ports: port 443 (HTTPS web interface), port 4443 (DIGSI 5 configuration software), and configurable ports used for syslog over TLS. These weak ciphers do not provide adequate cryptographic strength, enabling an attacker positioned in a man-in-the-middle (MitM) role to decrypt intercepted traffic. This could expose sensitive operational data, configuration details, or credentials transmitted between management consoles and the devices. The vulnerability affects all versions prior to 9.64 (or 9.65/8.90 depending on model) and is present across a broad range of SIPROTEC 5 devices widely used in electrical grid protection and automation. The CVSS v3.1 score is 5.9 (medium), reflecting network attack vector, high confidentiality impact, but no impact on integrity or availability, and requiring high attack complexity without privileges or user interaction. No known exploits are currently reported in the wild. Siemens has published advisories identifying affected versions but no direct patch links are provided in the data. The vulnerability underscores the importance of strong cryptographic standards in industrial control systems (ICS) to prevent data leakage and potential reconnaissance by threat actors.
Potential Impact
For European organizations, particularly those in the energy sector operating Siemens SIPROTEC 5 devices for grid protection and automation, this vulnerability poses a significant confidentiality risk. An attacker capable of intercepting network traffic—such as through compromised network segments or insider threats—could decrypt sensitive operational data, potentially revealing grid configurations, control commands, or credentials. This exposure could facilitate further targeted attacks, including disruption or manipulation of critical infrastructure. While the vulnerability does not directly impact system integrity or availability, the leakage of sensitive information can undermine operational security and resilience. Given the strategic importance of energy infrastructure in Europe and the widespread deployment of Siemens SIPROTEC devices, this vulnerability could be leveraged in espionage or sabotage campaigns. Additionally, regulatory frameworks like NIS2 and GDPR emphasize protecting critical infrastructure and personal data, so exploitation could have compliance and reputational consequences. The medium severity rating suggests a moderate but non-trivial risk that requires timely mitigation to prevent escalation.
Mitigation Recommendations
1. Upgrade all affected Siemens SIPROTEC 5 devices and communication modules to the latest firmware versions (9.64 or later as applicable) where weak cipher support has been removed or strengthened. 2. Review and disable weak or deprecated cryptographic ciphers and protocols on all exposed ports (443, 4443, and syslog TLS ports) via device configuration settings or network controls. 3. Implement network segmentation and strict access controls to limit exposure of SIPROTEC devices to trusted management networks only, reducing the risk of MitM attacks. 4. Employ network monitoring and intrusion detection systems to detect anomalous traffic patterns indicative of MitM or interception attempts. 5. Use VPNs or encrypted tunnels with strong cryptography for remote access to SIPROTEC devices to add an additional layer of protection. 6. Conduct regular security audits and penetration tests focusing on cryptographic configurations of ICS devices. 7. Train operational technology (OT) personnel on the risks of weak encryption and the importance of applying security updates promptly. 8. Coordinate with Siemens support for guidance on secure configuration and any available patches or mitigations. 9. Maintain an inventory of all affected devices to ensure comprehensive coverage of updates and mitigations. 10. Consider compensating controls such as physical security enhancements and strict network device authentication to reduce attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Norway
CVE-2024-38867: CWE-326: Inadequate Encryption Strength in Siemens SIPROTEC 5 6MD84 (CP300)
Description
A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.64), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.64), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.64), SIPROTEC 5 6MD89 (CP300) (All versions < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions < V9.64), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V9.64), SIPROTEC 5 7SA82 (CP100) (All versions < V8.90), SIPROTEC 5 7SA82 (CP150) (All versions < V9.65), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.65), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.65), SIPROTEC 5 7SD82 (CP100) (All versions < V8.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.65), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.65), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.65), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.65), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.65), SIPROTEC 5 7SL82 (CP100) (All versions < V8.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.65), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.65), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.65), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions < V9.64), SIPROTEC 5 7SX82 (CP150) (All versions < V9.65), SIPROTEC 5 7SX85 (CP300) (All versions < V9.65), SIPROTEC 5 7UM85 (CP300) (All versions < V9.64), SIPROTEC 5 7UT82 (CP100) (All versions < V8.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.65), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.65), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.65), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.65), SIPROTEC 5 7VE85 (CP300) (All versions < V9.64), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.65), SIPROTEC 5 7VU85 (CP300) (All versions < V9.64), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.62), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.64). The affected devices are supporting weak ciphers on several ports (443/tcp for web, 4443/tcp for DIGSI 5 and configurable port for syslog over TLS). This could allow an unauthorized attacker in a man-in-the-middle position to decrypt any data passed over to and from those ports.
AI-Powered Analysis
Technical Analysis
CVE-2024-38867 identifies a cryptographic weakness (CWE-326) in Siemens SIPROTEC 5 series devices, including numerous models such as 6MD84, 6MD85, 7SA82, 7SJ81, 7SL82, 7UT82, and others, as well as associated communication modules (ETH-BA-2EL, ETH-BB-2FO, ETH-BD-2FO). The vulnerability arises from the use of weak encryption ciphers on several TCP ports: port 443 (HTTPS web interface), port 4443 (DIGSI 5 configuration software), and configurable ports used for syslog over TLS. These weak ciphers do not provide adequate cryptographic strength, enabling an attacker positioned in a man-in-the-middle (MitM) role to decrypt intercepted traffic. This could expose sensitive operational data, configuration details, or credentials transmitted between management consoles and the devices. The vulnerability affects all versions prior to 9.64 (or 9.65/8.90 depending on model) and is present across a broad range of SIPROTEC 5 devices widely used in electrical grid protection and automation. The CVSS v3.1 score is 5.9 (medium), reflecting network attack vector, high confidentiality impact, but no impact on integrity or availability, and requiring high attack complexity without privileges or user interaction. No known exploits are currently reported in the wild. Siemens has published advisories identifying affected versions but no direct patch links are provided in the data. The vulnerability underscores the importance of strong cryptographic standards in industrial control systems (ICS) to prevent data leakage and potential reconnaissance by threat actors.
Potential Impact
For European organizations, particularly those in the energy sector operating Siemens SIPROTEC 5 devices for grid protection and automation, this vulnerability poses a significant confidentiality risk. An attacker capable of intercepting network traffic—such as through compromised network segments or insider threats—could decrypt sensitive operational data, potentially revealing grid configurations, control commands, or credentials. This exposure could facilitate further targeted attacks, including disruption or manipulation of critical infrastructure. While the vulnerability does not directly impact system integrity or availability, the leakage of sensitive information can undermine operational security and resilience. Given the strategic importance of energy infrastructure in Europe and the widespread deployment of Siemens SIPROTEC devices, this vulnerability could be leveraged in espionage or sabotage campaigns. Additionally, regulatory frameworks like NIS2 and GDPR emphasize protecting critical infrastructure and personal data, so exploitation could have compliance and reputational consequences. The medium severity rating suggests a moderate but non-trivial risk that requires timely mitigation to prevent escalation.
Mitigation Recommendations
1. Upgrade all affected Siemens SIPROTEC 5 devices and communication modules to the latest firmware versions (9.64 or later as applicable) where weak cipher support has been removed or strengthened. 2. Review and disable weak or deprecated cryptographic ciphers and protocols on all exposed ports (443, 4443, and syslog TLS ports) via device configuration settings or network controls. 3. Implement network segmentation and strict access controls to limit exposure of SIPROTEC devices to trusted management networks only, reducing the risk of MitM attacks. 4. Employ network monitoring and intrusion detection systems to detect anomalous traffic patterns indicative of MitM or interception attempts. 5. Use VPNs or encrypted tunnels with strong cryptography for remote access to SIPROTEC devices to add an additional layer of protection. 6. Conduct regular security audits and penetration tests focusing on cryptographic configurations of ICS devices. 7. Train operational technology (OT) personnel on the risks of weak encryption and the importance of applying security updates promptly. 8. Coordinate with Siemens support for guidance on secure configuration and any available patches or mitigations. 9. Maintain an inventory of all affected devices to ensure comprehensive coverage of updates and mitigations. 10. Consider compensating controls such as physical security enhancements and strict network device authentication to reduce attack surface.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2024-06-20T12:58:59.139Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbed1af
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 11/11/2025, 9:14:33 PM
Last updated: 12/2/2025, 3:06:26 PM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.