Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38867: CWE-326: Inadequate Encryption Strength in Siemens SIPROTEC 5 6MD84 (CP300)

0
Medium
VulnerabilityCVE-2024-38867cvecve-2024-38867cwe-326
Published: Tue Jul 09 2024 (07/09/2024, 12:05:10 UTC)
Source: CVE
Vendor/Project: Siemens
Product: SIPROTEC 5 6MD84 (CP300)

Description

A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.64), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.64), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.64), SIPROTEC 5 6MD89 (CP300) (All versions < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions < V9.64), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V9.64), SIPROTEC 5 7SA82 (CP100) (All versions < V8.90), SIPROTEC 5 7SA82 (CP150) (All versions < V9.65), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.65), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.65), SIPROTEC 5 7SD82 (CP100) (All versions < V8.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.65), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.65), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.65), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.65), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.65), SIPROTEC 5 7SL82 (CP100) (All versions < V8.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.65), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.65), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.65), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions < V9.64), SIPROTEC 5 7SX82 (CP150) (All versions < V9.65), SIPROTEC 5 7SX85 (CP300) (All versions < V9.65), SIPROTEC 5 7UM85 (CP300) (All versions < V9.64), SIPROTEC 5 7UT82 (CP100) (All versions < V8.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.65), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.65), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.65), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.65), SIPROTEC 5 7VE85 (CP300) (All versions < V9.64), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.65), SIPROTEC 5 7VU85 (CP300) (All versions < V9.64), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.62), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.64). The affected devices are supporting weak ciphers on several ports (443/tcp for web, 4443/tcp for DIGSI 5 and configurable port for syslog over TLS). This could allow an unauthorized attacker in a man-in-the-middle position to decrypt any data passed over to and from those ports.

AI-Powered Analysis

AILast updated: 11/11/2025, 21:14:33 UTC

Technical Analysis

CVE-2024-38867 identifies a cryptographic weakness (CWE-326) in Siemens SIPROTEC 5 series devices, including numerous models such as 6MD84, 6MD85, 7SA82, 7SJ81, 7SL82, 7UT82, and others, as well as associated communication modules (ETH-BA-2EL, ETH-BB-2FO, ETH-BD-2FO). The vulnerability arises from the use of weak encryption ciphers on several TCP ports: port 443 (HTTPS web interface), port 4443 (DIGSI 5 configuration software), and configurable ports used for syslog over TLS. These weak ciphers do not provide adequate cryptographic strength, enabling an attacker positioned in a man-in-the-middle (MitM) role to decrypt intercepted traffic. This could expose sensitive operational data, configuration details, or credentials transmitted between management consoles and the devices. The vulnerability affects all versions prior to 9.64 (or 9.65/8.90 depending on model) and is present across a broad range of SIPROTEC 5 devices widely used in electrical grid protection and automation. The CVSS v3.1 score is 5.9 (medium), reflecting network attack vector, high confidentiality impact, but no impact on integrity or availability, and requiring high attack complexity without privileges or user interaction. No known exploits are currently reported in the wild. Siemens has published advisories identifying affected versions but no direct patch links are provided in the data. The vulnerability underscores the importance of strong cryptographic standards in industrial control systems (ICS) to prevent data leakage and potential reconnaissance by threat actors.

Potential Impact

For European organizations, particularly those in the energy sector operating Siemens SIPROTEC 5 devices for grid protection and automation, this vulnerability poses a significant confidentiality risk. An attacker capable of intercepting network traffic—such as through compromised network segments or insider threats—could decrypt sensitive operational data, potentially revealing grid configurations, control commands, or credentials. This exposure could facilitate further targeted attacks, including disruption or manipulation of critical infrastructure. While the vulnerability does not directly impact system integrity or availability, the leakage of sensitive information can undermine operational security and resilience. Given the strategic importance of energy infrastructure in Europe and the widespread deployment of Siemens SIPROTEC devices, this vulnerability could be leveraged in espionage or sabotage campaigns. Additionally, regulatory frameworks like NIS2 and GDPR emphasize protecting critical infrastructure and personal data, so exploitation could have compliance and reputational consequences. The medium severity rating suggests a moderate but non-trivial risk that requires timely mitigation to prevent escalation.

Mitigation Recommendations

1. Upgrade all affected Siemens SIPROTEC 5 devices and communication modules to the latest firmware versions (9.64 or later as applicable) where weak cipher support has been removed or strengthened. 2. Review and disable weak or deprecated cryptographic ciphers and protocols on all exposed ports (443, 4443, and syslog TLS ports) via device configuration settings or network controls. 3. Implement network segmentation and strict access controls to limit exposure of SIPROTEC devices to trusted management networks only, reducing the risk of MitM attacks. 4. Employ network monitoring and intrusion detection systems to detect anomalous traffic patterns indicative of MitM or interception attempts. 5. Use VPNs or encrypted tunnels with strong cryptography for remote access to SIPROTEC devices to add an additional layer of protection. 6. Conduct regular security audits and penetration tests focusing on cryptographic configurations of ICS devices. 7. Train operational technology (OT) personnel on the risks of weak encryption and the importance of applying security updates promptly. 8. Coordinate with Siemens support for guidance on secure configuration and any available patches or mitigations. 9. Maintain an inventory of all affected devices to ensure comprehensive coverage of updates and mitigations. 10. Consider compensating controls such as physical security enhancements and strict network device authentication to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2024-06-20T12:58:59.139Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed1af

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 11/11/2025, 9:14:33 PM

Last updated: 12/2/2025, 3:06:26 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats