Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-53648: CWE-489: Active Debug Code in Siemens SIPROTEC 5 6MD84 (CP300)

0
Medium
VulnerabilityCVE-2024-53648cvecve-2024-53648cwe-489
Published: Tue Feb 11 2025 (02/11/2025, 10:28:52 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: SIPROTEC 5 6MD84 (CP300)

Description

A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.90), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.90), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.90), SIPROTEC 5 6MD89 (CP300) (All versions < V9.90), SIPROTEC 5 6MU85 (CP300) (All versions < V9.90), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V10.0), SIPROTEC 5 7SA82 (CP100) (All versions < V8.90), SIPROTEC 5 7SA82 (CP150) (All versions < V9.90), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.90), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.90), SIPROTEC 5 7SD82 (CP100) (All versions < V8.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.90), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.90), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.90), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.90), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.90), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.90), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.90), SIPROTEC 5 7SK82 (CP100) (All versions < V8.90), SIPROTEC 5 7SK82 (CP150) (All versions < V9.90), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.90), SIPROTEC 5 7SL82 (CP100) (All versions < V8.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.90), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.90), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.90), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.90), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V10.0), SIPROTEC 5 7ST86 (CP300) (All versions < V10.0), SIPROTEC 5 7SX82 (CP150) (All versions < V9.90), SIPROTEC 5 7SX85 (CP300) (All versions < V9.90), SIPROTEC 5 7SY82 (CP150) (All versions < V9.90), SIPROTEC 5 7UM85 (CP300) (All versions < V9.90), SIPROTEC 5 7UT82 (CP100) (All versions < V8.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.90), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.90), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.90), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.90), SIPROTEC 5 7VE85 (CP300) (All versions < V9.90), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.90), SIPROTEC 5 7VU85 (CP300) (All versions < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.90). Affected devices do not properly limit access to a development shell accessible over a physical interface. This could allow an unauthenticated attacker with physical access to the device to execute arbitrary commands on the device.

AI-Powered Analysis

AILast updated: 11/11/2025, 21:03:44 UTC

Technical Analysis

CVE-2024-53648 is a vulnerability classified under CWE-489 (Active Debug Code) found in numerous Siemens SIPROTEC 5 protection relay devices, including models 6MD84, 6MD85, 6MD86, 6MD89, 6MU85, 7KE85, 7SA82, 7SA86, 7SA87, 7SD82, 7SD86, 7SD87, 7SJ81, 7SJ82, 7SJ85, 7SJ86, 7SK82, 7SK85, 7SL82, 7SL86, 7SL87, 7SS85, 7ST85, 7ST86, 7SX82, 7SX85, 7SY82, 7UM85, 7UT82, 7UT85, 7UT86, 7UT87, 7VE85, 7VK87, 7VU85, and Compact 7SX800. The vulnerability exists because these devices include active debug code that exposes a development shell accessible through a physical interface, which is not properly secured. This allows an attacker with physical access to the device to bypass authentication and execute arbitrary commands directly on the device's operating environment. The vulnerability affects all versions prior to V9.90 or V10.0 depending on the model, indicating a widespread exposure across many deployed units. The CVSS v3.1 base score is 6.8 (medium severity), with an attack vector of physical access, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although exploitation requires physical access, the ability to execute arbitrary commands on critical protection relays poses a significant risk to power grid stability and security. No public exploits are known at this time, but the presence of active debug code in production devices is a serious security oversight. Siemens has not yet published patches, so mitigation currently relies on physical security controls and monitoring.

Potential Impact

The vulnerability impacts the confidentiality, integrity, and availability of SIPROTEC 5 devices, which are widely used in electrical power grid protection and automation. An attacker exploiting this flaw could manipulate relay settings, disable protections, or cause device malfunction, potentially leading to power outages, equipment damage, or safety hazards. For European organizations, particularly utilities and critical infrastructure operators, this vulnerability could facilitate sabotage or espionage if attackers gain physical access to relay devices. The risk is heightened in environments with less stringent physical security or where devices are installed in accessible locations. Disruption of power grid protection devices can have cascading effects on national energy stability and economic activities. The medium CVSS score reflects the physical access requirement but does not diminish the critical nature of the affected systems. The absence of known exploits suggests limited immediate threat but also underscores the need for proactive mitigation to prevent future attacks.

Mitigation Recommendations

1. Apply Siemens vendor patches and firmware updates as soon as they become available to remove or disable the active debug code and secure the development shell interface. 2. Enforce strict physical security controls around SIPROTEC 5 devices, including locked cabinets, surveillance, and access logging to prevent unauthorized physical access. 3. Conduct regular audits and inspections of relay devices to detect any signs of tampering or unauthorized access. 4. Implement network segmentation and monitoring to detect anomalous commands or behavior from SIPROTEC devices that could indicate compromise. 5. Train operational technology (OT) personnel on the risks of physical access vulnerabilities and the importance of device security hygiene. 6. Where possible, disable unused physical interfaces or ports on the devices to reduce attack surface. 7. Maintain an inventory of all affected devices and track their firmware versions to prioritize patching and risk management. 8. Collaborate with Siemens support for guidance on interim protective measures until patches are released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2024-11-21T13:26:39.692Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6913a08cf4d5bbdab5b1c78a

Added to database: 11/11/2025, 8:46:04 PM

Last enriched: 11/11/2025, 9:03:44 PM

Last updated: 11/21/2025, 9:07:22 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats