CVE-2024-53648: CWE-489: Active Debug Code in Siemens SIPROTEC 5 6MD84 (CP300)
A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.90), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.90), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.90), SIPROTEC 5 6MD89 (CP300) (All versions < V9.90), SIPROTEC 5 6MU85 (CP300) (All versions < V9.90), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V10.0), SIPROTEC 5 7SA82 (CP100) (All versions < V8.90), SIPROTEC 5 7SA82 (CP150) (All versions < V9.90), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.90), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.90), SIPROTEC 5 7SD82 (CP100) (All versions < V8.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.90), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.90), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.90), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.90), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.90), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.90), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.90), SIPROTEC 5 7SK82 (CP100) (All versions < V8.90), SIPROTEC 5 7SK82 (CP150) (All versions < V9.90), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.90), SIPROTEC 5 7SL82 (CP100) (All versions < V8.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.90), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.90), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.90), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.90), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V10.0), SIPROTEC 5 7ST86 (CP300) (All versions < V10.0), SIPROTEC 5 7SX82 (CP150) (All versions < V9.90), SIPROTEC 5 7SX85 (CP300) (All versions < V9.90), SIPROTEC 5 7SY82 (CP150) (All versions < V9.90), SIPROTEC 5 7UM85 (CP300) (All versions < V9.90), SIPROTEC 5 7UT82 (CP100) (All versions < V8.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.90), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.90), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.90), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.90), SIPROTEC 5 7VE85 (CP300) (All versions < V9.90), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.90), SIPROTEC 5 7VU85 (CP300) (All versions < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.90). Affected devices do not properly limit access to a development shell accessible over a physical interface. This could allow an unauthenticated attacker with physical access to the device to execute arbitrary commands on the device.
AI Analysis
Technical Summary
CVE-2024-53648 is a vulnerability classified under CWE-489 (Active Debug Code) found in numerous Siemens SIPROTEC 5 protection relay devices, including models 6MD84, 6MD85, 6MD86, 6MD89, 6MU85, 7KE85, 7SA82, 7SA86, 7SA87, 7SD82, 7SD86, 7SD87, 7SJ81, 7SJ82, 7SJ85, 7SJ86, 7SK82, 7SK85, 7SL82, 7SL86, 7SL87, 7SS85, 7ST85, 7ST86, 7SX82, 7SX85, 7SY82, 7UM85, 7UT82, 7UT85, 7UT86, 7UT87, 7VE85, 7VK87, 7VU85, and Compact 7SX800. The vulnerability exists because these devices include active debug code that exposes a development shell accessible through a physical interface, which is not properly secured. This allows an attacker with physical access to the device to bypass authentication and execute arbitrary commands directly on the device's operating environment. The vulnerability affects all versions prior to V9.90 or V10.0 depending on the model, indicating a widespread exposure across many deployed units. The CVSS v3.1 base score is 6.8 (medium severity), with an attack vector of physical access, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although exploitation requires physical access, the ability to execute arbitrary commands on critical protection relays poses a significant risk to power grid stability and security. No public exploits are known at this time, but the presence of active debug code in production devices is a serious security oversight. Siemens has not yet published patches, so mitigation currently relies on physical security controls and monitoring.
Potential Impact
The vulnerability impacts the confidentiality, integrity, and availability of SIPROTEC 5 devices, which are widely used in electrical power grid protection and automation. An attacker exploiting this flaw could manipulate relay settings, disable protections, or cause device malfunction, potentially leading to power outages, equipment damage, or safety hazards. For European organizations, particularly utilities and critical infrastructure operators, this vulnerability could facilitate sabotage or espionage if attackers gain physical access to relay devices. The risk is heightened in environments with less stringent physical security or where devices are installed in accessible locations. Disruption of power grid protection devices can have cascading effects on national energy stability and economic activities. The medium CVSS score reflects the physical access requirement but does not diminish the critical nature of the affected systems. The absence of known exploits suggests limited immediate threat but also underscores the need for proactive mitigation to prevent future attacks.
Mitigation Recommendations
1. Apply Siemens vendor patches and firmware updates as soon as they become available to remove or disable the active debug code and secure the development shell interface. 2. Enforce strict physical security controls around SIPROTEC 5 devices, including locked cabinets, surveillance, and access logging to prevent unauthorized physical access. 3. Conduct regular audits and inspections of relay devices to detect any signs of tampering or unauthorized access. 4. Implement network segmentation and monitoring to detect anomalous commands or behavior from SIPROTEC devices that could indicate compromise. 5. Train operational technology (OT) personnel on the risks of physical access vulnerabilities and the importance of device security hygiene. 6. Where possible, disable unused physical interfaces or ports on the devices to reduce attack surface. 7. Maintain an inventory of all affected devices and track their firmware versions to prioritize patching and risk management. 8. Collaborate with Siemens support for guidance on interim protective measures until patches are released.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Norway
CVE-2024-53648: CWE-489: Active Debug Code in Siemens SIPROTEC 5 6MD84 (CP300)
Description
A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.90), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.90), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions < V9.90), SIPROTEC 5 6MD89 (CP300) (All versions < V9.90), SIPROTEC 5 6MU85 (CP300) (All versions < V9.90), SIPROTEC 5 7KE85 (CP200) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions < V10.0), SIPROTEC 5 7SA82 (CP100) (All versions < V8.90), SIPROTEC 5 7SA82 (CP150) (All versions < V9.90), SIPROTEC 5 7SA86 (CP200) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions < V9.90), SIPROTEC 5 7SA87 (CP200) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions < V9.90), SIPROTEC 5 7SD82 (CP100) (All versions < V8.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.90), SIPROTEC 5 7SD86 (CP200) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions < V9.90), SIPROTEC 5 7SD87 (CP200) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions < V9.90), SIPROTEC 5 7SJ81 (CP100) (All versions < V8.90), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ82 (CP100) (All versions < V8.90), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ85 (CP200) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions < V9.90), SIPROTEC 5 7SJ86 (CP200) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions < V9.90), SIPROTEC 5 7SK82 (CP100) (All versions < V8.90), SIPROTEC 5 7SK82 (CP150) (All versions < V9.90), SIPROTEC 5 7SK85 (CP200) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions < V9.90), SIPROTEC 5 7SL82 (CP100) (All versions < V8.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.90), SIPROTEC 5 7SL86 (CP200) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions < V9.90), SIPROTEC 5 7SL87 (CP200) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions < V9.90), SIPROTEC 5 7SS85 (CP200) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions < V9.90), SIPROTEC 5 7ST85 (CP200) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions < V10.0), SIPROTEC 5 7ST86 (CP300) (All versions < V10.0), SIPROTEC 5 7SX82 (CP150) (All versions < V9.90), SIPROTEC 5 7SX85 (CP300) (All versions < V9.90), SIPROTEC 5 7SY82 (CP150) (All versions < V9.90), SIPROTEC 5 7UM85 (CP300) (All versions < V9.90), SIPROTEC 5 7UT82 (CP100) (All versions < V8.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.90), SIPROTEC 5 7UT85 (CP200) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions < V9.90), SIPROTEC 5 7UT86 (CP200) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions < V9.90), SIPROTEC 5 7UT87 (CP200) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions < V9.90), SIPROTEC 5 7VE85 (CP300) (All versions < V9.90), SIPROTEC 5 7VK87 (CP200) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions < V9.90), SIPROTEC 5 7VU85 (CP300) (All versions < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V9.90). Affected devices do not properly limit access to a development shell accessible over a physical interface. This could allow an unauthenticated attacker with physical access to the device to execute arbitrary commands on the device.
AI-Powered Analysis
Technical Analysis
CVE-2024-53648 is a vulnerability classified under CWE-489 (Active Debug Code) found in numerous Siemens SIPROTEC 5 protection relay devices, including models 6MD84, 6MD85, 6MD86, 6MD89, 6MU85, 7KE85, 7SA82, 7SA86, 7SA87, 7SD82, 7SD86, 7SD87, 7SJ81, 7SJ82, 7SJ85, 7SJ86, 7SK82, 7SK85, 7SL82, 7SL86, 7SL87, 7SS85, 7ST85, 7ST86, 7SX82, 7SX85, 7SY82, 7UM85, 7UT82, 7UT85, 7UT86, 7UT87, 7VE85, 7VK87, 7VU85, and Compact 7SX800. The vulnerability exists because these devices include active debug code that exposes a development shell accessible through a physical interface, which is not properly secured. This allows an attacker with physical access to the device to bypass authentication and execute arbitrary commands directly on the device's operating environment. The vulnerability affects all versions prior to V9.90 or V10.0 depending on the model, indicating a widespread exposure across many deployed units. The CVSS v3.1 base score is 6.8 (medium severity), with an attack vector of physical access, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although exploitation requires physical access, the ability to execute arbitrary commands on critical protection relays poses a significant risk to power grid stability and security. No public exploits are known at this time, but the presence of active debug code in production devices is a serious security oversight. Siemens has not yet published patches, so mitigation currently relies on physical security controls and monitoring.
Potential Impact
The vulnerability impacts the confidentiality, integrity, and availability of SIPROTEC 5 devices, which are widely used in electrical power grid protection and automation. An attacker exploiting this flaw could manipulate relay settings, disable protections, or cause device malfunction, potentially leading to power outages, equipment damage, or safety hazards. For European organizations, particularly utilities and critical infrastructure operators, this vulnerability could facilitate sabotage or espionage if attackers gain physical access to relay devices. The risk is heightened in environments with less stringent physical security or where devices are installed in accessible locations. Disruption of power grid protection devices can have cascading effects on national energy stability and economic activities. The medium CVSS score reflects the physical access requirement but does not diminish the critical nature of the affected systems. The absence of known exploits suggests limited immediate threat but also underscores the need for proactive mitigation to prevent future attacks.
Mitigation Recommendations
1. Apply Siemens vendor patches and firmware updates as soon as they become available to remove or disable the active debug code and secure the development shell interface. 2. Enforce strict physical security controls around SIPROTEC 5 devices, including locked cabinets, surveillance, and access logging to prevent unauthorized physical access. 3. Conduct regular audits and inspections of relay devices to detect any signs of tampering or unauthorized access. 4. Implement network segmentation and monitoring to detect anomalous commands or behavior from SIPROTEC devices that could indicate compromise. 5. Train operational technology (OT) personnel on the risks of physical access vulnerabilities and the importance of device security hygiene. 6. Where possible, disable unused physical interfaces or ports on the devices to reduce attack surface. 7. Maintain an inventory of all affected devices and track their firmware versions to prioritize patching and risk management. 8. Collaborate with Siemens support for guidance on interim protective measures until patches are released.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- siemens
- Date Reserved
- 2024-11-21T13:26:39.692Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6913a08cf4d5bbdab5b1c78a
Added to database: 11/11/2025, 8:46:04 PM
Last enriched: 11/11/2025, 9:03:44 PM
Last updated: 11/21/2025, 9:07:22 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13156: CWE-434 Unrestricted Upload of File with Dangerous Type in appsbd Vitepos – Point of Sale (POS) for WooCommerce
HighCVE-2025-13149: CWE-862 Missing Authorization in publishpress Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories
MediumCVE-2025-13141: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in devitemsllc HT Mega – Absolute Addons For Elementor
MediumCVE-2025-12039: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in devsmip BigBuy Dropshipping Connector for WooCommerce
MediumCVE-2025-11973: CWE-73 External Control of File Name or Path
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.