Skip to main content

CVE-2024-38867: CWE-326: Inadequate Encryption Strength in Siemens SIPROTEC 5 6MD84 (CP300)

Medium
VulnerabilityCVE-2024-38867cvecve-2024-38867cwe-326
Published: Tue Jul 09 2024 (07/09/2024, 12:05:10 UTC)
Source: CVE
Vendor/Project: Siemens
Product: SIPROTEC 5 6MD84 (CP300)

Description

A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.64), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.64), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.64), SIPROTEC 5 6MD89 (CP300) (All versions < V9.64), SIPROTEC 5 6MU85 (CP300) (All versions < V9.64), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V9.64), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions < V9.65), SIPROTEC 5 7SA84 (CP200) (All versions), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.65), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.65), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions < V9.65), SIPROTEC 5 7SD84 (CP200) (All versions), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.65), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.89), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.65), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.65), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.65), SIPROTEC 5 7SK82 (CP100) (All versions < V8.89), SIPROTEC 5 7SK82 (CP150) (All versions < V9.65), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.65), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions < V9.65), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.65), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.65), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V9.64), SIPROTEC 5 7ST86 (CP300) (All versions < V9.64), SIPROTEC 5 7SX82 (CP150) (All versions < V9.65), SIPROTEC 5 7SX85 (CP300) (All versions < V9.65), SIPROTEC 5 7UM85 (CP300) (All versions < V9.64), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions < V9.65), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.65), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.65), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.65), SIPROTEC 5 7VE85 (CP300) (All versions < V9.64), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.65), SIPROTEC 5 7VU85 (CP300) (All versions < V9.64), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions installed on CP200 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V9.62 installed on CP150 and CP300 devices), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 1) (All versions < V8.89 installed on CP100 devices), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions < V9.62), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.64). The affected devices are supporting weak ciphers on several ports (443/tcp for web, 4443/tcp for DIGSI 5 and configurable port for syslog over TLS). This could allow an unauthorized attacker in a man-in-the-middle position to decrypt any data passed over to and from those ports.

AI-Powered Analysis

AILast updated: 06/25/2025, 16:03:33 UTC

Technical Analysis

CVE-2024-38867 is a vulnerability affecting multiple models and versions of Siemens SIPROTEC 5 devices, including various 6MD, 7KE, 7SA, 7SD, 7SJ, 7SK, 7SL, 7SS, 7ST, 7SX, 7UM, 7UT, 7VE, 7VK, 7VU series, as well as communication modules ETH-BA-2EL, ETH-BB-2FO, ETH-BD-2FO, and Compact 7SX800 (CP050). The core issue is the use of inadequate encryption strength on several network ports, specifically TCP ports 443 (HTTPS), 4443 (DIGSI 5 protocol), and configurable ports for syslog over TLS. These weak ciphers allow an attacker positioned as a man-in-the-middle (MitM) to decrypt sensitive data transmitted between clients and these devices. The vulnerability stems from CWE-326, indicating insufficient cryptographic strength, which compromises confidentiality but does not affect integrity or availability directly. The CVSS v3.1 base score is 5.9 (medium severity), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and a high impact on confidentiality only. Exploitation requires the attacker to be able to intercept network traffic, which is plausible in environments where these devices communicate over untrusted or poorly segmented networks. Siemens SIPROTEC 5 devices are widely used in electrical power protection and automation systems, making this vulnerability particularly relevant to critical infrastructure sectors. The lack of patches or updates linked in the provided data suggests that mitigation relies on configuration changes or network-level protections until Siemens releases fixes. Overall, the vulnerability exposes sensitive operational data to interception, potentially aiding attackers in reconnaissance or further attacks against power grid control systems.

Potential Impact

For European organizations, especially those in the energy and utilities sectors, this vulnerability poses a significant risk to the confidentiality of operational data transmitted by SIPROTEC 5 devices. These devices are integral to power grid protection and automation, and interception of their communications could reveal network topology, operational parameters, or control commands. Such information leakage could facilitate targeted attacks, including sabotage or disruption of power delivery. While the vulnerability does not directly allow control or disruption (no integrity or availability impact), the exposure of sensitive data undermines trust and could lead to secondary attacks. European critical infrastructure operators are often subject to stringent cybersecurity regulations (e.g., NIS Directive), and exploitation of this vulnerability could lead to regulatory penalties and reputational damage. Additionally, the presence of weak encryption could be exploited by nation-state actors or cybercriminals aiming to gain intelligence or prepare for more destructive attacks. The medium CVSS score reflects the need for attention but indicates that exploitation is not trivial, requiring network access and MitM capability. However, given the strategic importance of power infrastructure in Europe, even medium-severity vulnerabilities warrant prompt mitigation.

Mitigation Recommendations

1. Immediate network segmentation: Isolate SIPROTEC 5 devices on dedicated, secure network segments with strict access controls to prevent unauthorized interception of traffic. 2. Use VPNs or IPsec tunnels: Where possible, encapsulate device communications within stronger encrypted tunnels to mitigate weak cipher exposure. 3. Disable legacy or weak cipher suites: Review and configure device settings to disable weak TLS cipher suites if the device firmware allows. 4. Monitor network traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous MitM activities or unusual traffic patterns targeting SIPROTEC devices. 5. Physical security: Ensure that network infrastructure connecting these devices is physically secured to reduce risk of MitM positioning. 6. Vendor engagement: Engage Siemens support to obtain timelines for patches or firmware updates addressing this vulnerability and plan for timely deployment. 7. Incident response readiness: Prepare detection and response plans for potential exploitation attempts, including logs review and forensic capabilities. 8. Alternative communication channels: Where feasible, use out-of-band management or hardened communication protocols until patches are available. These steps go beyond generic advice by focusing on network architecture changes, active monitoring, and vendor coordination specific to the operational context of SIPROTEC devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2024-06-20T12:58:59.139Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed1af

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 4:03:33 PM

Last updated: 8/1/2025, 5:03:29 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats