CVE-2024-38867: CWE-326: Inadequate Encryption Strength in Siemens SIPROTEC 5 6MD84 (CP300)
A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.64), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.64), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.64), SIPROTEC 5 6MD89 (CP300) (All versions < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions < V9.64), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V9.64), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.65), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.65), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.65), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.65), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.65), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.65), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.65), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.65), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.65), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.65), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.65), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions < V9.64), SIPROTEC 5 7SX82 (CP150) (All versions < V9.65), SIPROTEC 5 7SX85 (CP300) (All versions < V9.65), SIPROTEC 5 7UM85 (CP300) (All versions < V9.64), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.65), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.65), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.65), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.65), SIPROTEC 5 7VE85 (CP300) (All versions < V9.64), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.65), SIPROTEC 5 7VU85 (CP300) (All versions < V9.64), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.62), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.64). The affected devices are supporting weak ciphers on several ports (443/tcp for web, 4443/tcp for DIGSI 5 and configurable port for syslog over TLS). This could allow an unauthorized attacker in a man-in-the-middle position to decrypt any data passed over to and from those ports.
AI Analysis
Technical Summary
CVE-2024-38867 is a vulnerability affecting multiple models and versions of Siemens SIPROTEC 5 devices, including various 6MD, 7KE, 7SA, 7SD, 7SJ, 7SK, 7SL, 7SS, 7ST, 7SX, 7UM, 7UT, 7VE, 7VK, 7VU series, as well as communication modules ETH-BA-2EL, ETH-BB-2FO, ETH-BD-2FO, and Compact 7SX800 (CP050). The core issue is the use of inadequate encryption strength on several network ports, specifically TCP ports 443 (HTTPS), 4443 (DIGSI 5 protocol), and configurable ports for syslog over TLS. These weak ciphers allow an attacker positioned as a man-in-the-middle (MitM) to decrypt sensitive data transmitted between clients and these devices. The vulnerability stems from CWE-326, indicating insufficient cryptographic strength, which compromises confidentiality but does not affect integrity or availability directly. The CVSS v3.1 base score is 5.9 (medium severity), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and a high impact on confidentiality only. Exploitation requires the attacker to be able to intercept network traffic, which is plausible in environments where these devices communicate over untrusted or poorly segmented networks. Siemens SIPROTEC 5 devices are widely used in electrical power protection and automation systems, making this vulnerability particularly relevant to critical infrastructure sectors. The lack of patches or updates linked in the provided data suggests that mitigation relies on configuration changes or network-level protections until Siemens releases fixes. Overall, the vulnerability exposes sensitive operational data to interception, potentially aiding attackers in reconnaissance or further attacks against power grid control systems.
Potential Impact
For European organizations, especially those in the energy and utilities sectors, this vulnerability poses a significant risk to the confidentiality of operational data transmitted by SIPROTEC 5 devices. These devices are integral to power grid protection and automation, and interception of their communications could reveal network topology, operational parameters, or control commands. Such information leakage could facilitate targeted attacks, including sabotage or disruption of power delivery. While the vulnerability does not directly allow control or disruption (no integrity or availability impact), the exposure of sensitive data undermines trust and could lead to secondary attacks. European critical infrastructure operators are often subject to stringent cybersecurity regulations (e.g., NIS Directive), and exploitation of this vulnerability could lead to regulatory penalties and reputational damage. Additionally, the presence of weak encryption could be exploited by nation-state actors or cybercriminals aiming to gain intelligence or prepare for more destructive attacks. The medium CVSS score reflects the need for attention but indicates that exploitation is not trivial, requiring network access and MitM capability. However, given the strategic importance of power infrastructure in Europe, even medium-severity vulnerabilities warrant prompt mitigation.
Mitigation Recommendations
1. Immediate network segmentation: Isolate SIPROTEC 5 devices on dedicated, secure network segments with strict access controls to prevent unauthorized interception of traffic. 2. Use VPNs or IPsec tunnels: Where possible, encapsulate device communications within stronger encrypted tunnels to mitigate weak cipher exposure. 3. Disable legacy or weak cipher suites: Review and configure device settings to disable weak TLS cipher suites if the device firmware allows. 4. Monitor network traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous MitM activities or unusual traffic patterns targeting SIPROTEC devices. 5. Physical security: Ensure that network infrastructure connecting these devices is physically secured to reduce risk of MitM positioning. 6. Vendor engagement: Engage Siemens support to obtain timelines for patches or firmware updates addressing this vulnerability and plan for timely deployment. 7. Incident response readiness: Prepare detection and response plans for potential exploitation attempts, including logs review and forensic capabilities. 8. Alternative communication channels: Where feasible, use out-of-band management or hardened communication protocols until patches are available. These steps go beyond generic advice by focusing on network architecture changes, active monitoring, and vendor coordination specific to the operational context of SIPROTEC devices.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2024-38867: CWE-326: Inadequate Encryption Strength in Siemens SIPROTEC 5 6MD84 (CP300)
Description
A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.64), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.64), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.64), SIPROTEC 5 6MD89 (CP300) (All versions < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions < V9.64), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V9.64), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.65), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.65), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.65), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.65), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.65), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.65), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.65), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.65), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.65), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.65), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.65), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions < V9.64), SIPROTEC 5 7SX82 (CP150) (All versions < V9.65), SIPROTEC 5 7SX85 (CP300) (All versions < V9.65), SIPROTEC 5 7UM85 (CP300) (All versions < V9.64), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.65), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.65), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.65), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.65), SIPROTEC 5 7VE85 (CP300) (All versions < V9.64), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.65), SIPROTEC 5 7VU85 (CP300) (All versions < V9.64), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.62), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.64). The affected devices are supporting weak ciphers on several ports (443/tcp for web, 4443/tcp for DIGSI 5 and configurable port for syslog over TLS). This could allow an unauthorized attacker in a man-in-the-middle position to decrypt any data passed over to and from those ports.
AI-Powered Analysis
Technical Analysis
CVE-2024-38867 is a vulnerability affecting multiple models and versions of Siemens SIPROTEC 5 devices, including various 6MD, 7KE, 7SA, 7SD, 7SJ, 7SK, 7SL, 7SS, 7ST, 7SX, 7UM, 7UT, 7VE, 7VK, 7VU series, as well as communication modules ETH-BA-2EL, ETH-BB-2FO, ETH-BD-2FO, and Compact 7SX800 (CP050). The core issue is the use of inadequate encryption strength on several network ports, specifically TCP ports 443 (HTTPS), 4443 (DIGSI 5 protocol), and configurable ports for syslog over TLS. These weak ciphers allow an attacker positioned as a man-in-the-middle (MitM) to decrypt sensitive data transmitted between clients and these devices. The vulnerability stems from CWE-326, indicating insufficient cryptographic strength, which compromises confidentiality but does not affect integrity or availability directly. The CVSS v3.1 base score is 5.9 (medium severity), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and a high impact on confidentiality only. Exploitation requires the attacker to be able to intercept network traffic, which is plausible in environments where these devices communicate over untrusted or poorly segmented networks. Siemens SIPROTEC 5 devices are widely used in electrical power protection and automation systems, making this vulnerability particularly relevant to critical infrastructure sectors. The lack of patches or updates linked in the provided data suggests that mitigation relies on configuration changes or network-level protections until Siemens releases fixes. Overall, the vulnerability exposes sensitive operational data to interception, potentially aiding attackers in reconnaissance or further attacks against power grid control systems.
Potential Impact
For European organizations, especially those in the energy and utilities sectors, this vulnerability poses a significant risk to the confidentiality of operational data transmitted by SIPROTEC 5 devices. These devices are integral to power grid protection and automation, and interception of their communications could reveal network topology, operational parameters, or control commands. Such information leakage could facilitate targeted attacks, including sabotage or disruption of power delivery. While the vulnerability does not directly allow control or disruption (no integrity or availability impact), the exposure of sensitive data undermines trust and could lead to secondary attacks. European critical infrastructure operators are often subject to stringent cybersecurity regulations (e.g., NIS Directive), and exploitation of this vulnerability could lead to regulatory penalties and reputational damage. Additionally, the presence of weak encryption could be exploited by nation-state actors or cybercriminals aiming to gain intelligence or prepare for more destructive attacks. The medium CVSS score reflects the need for attention but indicates that exploitation is not trivial, requiring network access and MitM capability. However, given the strategic importance of power infrastructure in Europe, even medium-severity vulnerabilities warrant prompt mitigation.
Mitigation Recommendations
1. Immediate network segmentation: Isolate SIPROTEC 5 devices on dedicated, secure network segments with strict access controls to prevent unauthorized interception of traffic. 2. Use VPNs or IPsec tunnels: Where possible, encapsulate device communications within stronger encrypted tunnels to mitigate weak cipher exposure. 3. Disable legacy or weak cipher suites: Review and configure device settings to disable weak TLS cipher suites if the device firmware allows. 4. Monitor network traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous MitM activities or unusual traffic patterns targeting SIPROTEC devices. 5. Physical security: Ensure that network infrastructure connecting these devices is physically secured to reduce risk of MitM positioning. 6. Vendor engagement: Engage Siemens support to obtain timelines for patches or firmware updates addressing this vulnerability and plan for timely deployment. 7. Incident response readiness: Prepare detection and response plans for potential exploitation attempts, including logs review and forensic capabilities. 8. Alternative communication channels: Where feasible, use out-of-band management or hardened communication protocols until patches are available. These steps go beyond generic advice by focusing on network architecture changes, active monitoring, and vendor coordination specific to the operational context of SIPROTEC devices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2024-06-20T12:58:59.139Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbed1af
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 6/25/2025, 4:03:33 PM
Last updated: 8/1/2025, 5:03:29 AM
Views: 9
Related Threats
CVE-2025-9109: Observable Response Discrepancy in Portabilis i-Diario
MediumCVE-2025-9108: Improper Restriction of Rendered UI Layers in Portabilis i-Diario
MediumCVE-2025-9107: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9106: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-9105: Cross Site Scripting in Portabilis i-Diario
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.