Skip to main content

CVE-2024-54015: CWE-1392: Use of Default Credentials in Siemens SIPROTEC 5 6MD84 (CP300)

High
VulnerabilityCVE-2024-54015cvecve-2024-54015cwe-1392
Published: Tue Feb 11 2025 (02/11/2025, 10:28:58 UTC)
Source: CVE
Vendor/Project: Siemens
Product: SIPROTEC 5 6MD84 (CP300)

Description

A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.90), SIPROTEC 5 6MD85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MD89 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 6MU85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7KE85 (CP300) (All versions >= V8.80), SIPROTEC 5 7SA82 (CP150) (All versions < V9.90), SIPROTEC 5 7SA86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SA87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD82 (CP150) (All versions < V9.90), SIPROTEC 5 7SD86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SD87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ81 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ82 (CP150) (All versions < V9.90), SIPROTEC 5 7SJ85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SJ86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SK82 (CP150) (All versions < V9.90), SIPROTEC 5 7SK85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL82 (CP150) (All versions < V9.90), SIPROTEC 5 7SL86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SL87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SS85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7ST85 (CP300) (All versions >= V8.80 < V9.68), SIPROTEC 5 7ST86 (CP300) (All versions < V9.83), SIPROTEC 5 7SX82 (CP150) (All versions < V9.90), SIPROTEC 5 7SX85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7SY82 (CP150) (All versions < V9.90), SIPROTEC 5 7UM85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT82 (CP150) (All versions < V9.90), SIPROTEC 5 7UT85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT86 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7UT87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VE85 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VK87 (CP300) (All versions >= V8.80 < V9.90), SIPROTEC 5 7VU85 (CP300) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BA-2EL (Rev.2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BB-2FO (Rev. 2) (All versions < V9.90), SIPROTEC 5 Communication Module ETH-BD-2FO (All versions >= V8.80 < V9.90), SIPROTEC 5 Compact 7SX800 (CP050) (All versions >= V9.50 < V9.90). Affected devices do not properly validate SNMP GET requests. This could allow an unauthenticated, remote attacker to retrieve sensitive information of the affected devices with SNMPv2 GET requests using default credentials.

AI-Powered Analysis

AILast updated: 07/04/2025, 21:26:17 UTC

Technical Analysis

CVE-2024-54015 is a high-severity vulnerability affecting multiple versions of Siemens SIPROTEC 5 devices, specifically various models of protection relays and communication modules widely used in electrical power systems. The vulnerability arises from the use of default credentials combined with improper validation of SNMPv2 GET requests. An unauthenticated remote attacker can exploit this flaw by sending SNMP GET requests to the affected devices, leveraging default credentials to retrieve sensitive information without requiring any user interaction or prior authentication. The affected devices include a broad range of SIPROTEC 5 models (e.g., 6MD84, 7SA82, 7SJ85, 7SX82, 7UT85, and communication modules ETH-BA-2EL, ETH-BB-2FO, etc.) across firmware versions prior to V9.90 or within specified version ranges. The vulnerability is classified under CWE-1392, indicating the use of default credentials, which is a critical security weakness. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and a significant impact on confidentiality. While the vulnerability does not affect integrity or availability, the exposure of sensitive information could facilitate further attacks or unauthorized access to critical infrastructure components. No known exploits are currently reported in the wild, but the presence of default credentials and remote accessibility makes this vulnerability a significant risk for industrial control systems relying on these devices. Siemens has not yet published patches for all affected versions, emphasizing the need for immediate mitigations by operators.

Potential Impact

For European organizations, especially those operating critical infrastructure such as electrical utilities and grid operators, this vulnerability poses a substantial risk. SIPROTEC 5 devices are integral to power system protection, monitoring, and control. Unauthorized disclosure of sensitive device information could enable attackers to map network topology, identify device configurations, and plan targeted attacks that may disrupt power delivery or cause physical damage. Given the critical nature of power infrastructure in Europe and the increasing sophistication of cyber threats targeting industrial control systems, exploitation of this vulnerability could lead to operational disruptions, regulatory penalties, and loss of public trust. Furthermore, the vulnerability's ease of exploitation without authentication increases the attack surface, particularly for organizations with insufficient network segmentation or exposure of control devices to less secure networks. The impact extends beyond confidentiality, as attackers gaining detailed device information could leverage it for subsequent attacks affecting integrity or availability, potentially leading to cascading failures in the power grid.

Mitigation Recommendations

1. Immediate network segmentation: Isolate SIPROTEC 5 devices from general enterprise networks and restrict SNMP traffic to trusted management stations only. 2. Change default credentials: Where possible, replace default SNMP community strings or credentials with strong, unique values to prevent unauthorized access. 3. Disable SNMPv2 if not required: Prefer SNMPv3 with encryption and authentication, or disable SNMP services on devices if monitoring is not essential. 4. Implement strict firewall rules: Block SNMP GET requests from untrusted sources and limit access to management interfaces. 5. Monitor network traffic: Deploy intrusion detection systems to alert on unusual SNMP activity targeting SIPROTEC devices. 6. Apply vendor updates: Regularly check Siemens advisories and apply firmware updates or patches as they become available to remediate the vulnerability. 7. Conduct security audits: Perform configuration reviews and penetration testing focused on industrial control system devices to identify and remediate similar weaknesses. 8. Incident response planning: Prepare for potential exploitation scenarios by developing response playbooks specific to industrial control system compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2024-11-27T09:14:02.059Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd66df

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/4/2025, 9:26:17 PM

Last updated: 8/13/2025, 7:20:25 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats