CVE-2025-24008: CWE-311: Missing Encryption of Sensitive Data in Siemens SIRIUS 3RK3 Modular Safety System (MSS)
A vulnerability has been identified in SIRIUS 3RK3 Modular Safety System (MSS) (All versions), SIRIUS Safety Relays 3SK2 (All versions). The affected devices do not encrypt data in transit. An attacker with network access could eavesdrop the connection and retrieve sensitive information, including obfuscated safety passwords.
AI Analysis
Technical Summary
CVE-2025-24008 is a vulnerability identified in Siemens' SIRIUS 3RK3 Modular Safety System (MSS) and SIRIUS Safety Relays 3SK2 across all versions. The core issue is the absence of encryption for data transmitted between devices, which constitutes a CWE-311 weakness (Missing Encryption of Sensitive Data). This lack of encryption allows an attacker with network access to eavesdrop on communications and potentially retrieve sensitive information, including obfuscated safety passwords. The vulnerability is exploitable remotely over the network without requiring prior authentication, although user interaction is necessary to trigger the exploit. The CVSS 3.1 base score is 6.5 (medium severity), reflecting high confidentiality impact but no impact on integrity or availability. The vulnerability affects safety-critical industrial control systems used in automation and safety applications, where confidentiality of safety passwords and command data is essential to prevent unauthorized control or sabotage. No patches are currently available, and no known exploits have been observed in the wild. The vulnerability was publicly disclosed on May 13, 2025, with the issue reserved earlier in January 2025. Siemens devices affected are widely used in industrial environments, including manufacturing plants, critical infrastructure, and process automation, where secure communication is paramount to maintain operational safety and prevent industrial espionage or sabotage.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially in sectors relying on industrial automation and safety systems such as manufacturing, energy, transportation, and critical infrastructure. The ability to intercept sensitive data like safety passwords could enable attackers to gain unauthorized insight into safety system configurations or potentially facilitate further attacks by leveraging exposed credentials. Although the vulnerability does not directly allow modification of commands or disruption of operations, the confidentiality breach could lead to espionage, intellectual property theft, or preparation for more damaging attacks. Given the critical role of Siemens SIRIUS MSS and Safety Relays in European industrial environments, exploitation could undermine trust in safety systems and cause regulatory and compliance issues under GDPR and NIS Directive frameworks. The medium severity rating suggests a moderate but non-negligible threat level, warranting timely mitigation to prevent escalation or combined attacks.
Mitigation Recommendations
European organizations should implement network segmentation to isolate Siemens SIRIUS MSS and Safety Relays from general IT networks, limiting exposure to untrusted network segments. Employing VPNs or secure tunnels for remote access can add encryption layers to mitigate the lack of native encryption. Monitoring network traffic for unusual eavesdropping or scanning activities targeting these devices is critical. Organizations should also enforce strict access controls and limit network access to authorized personnel and systems only. Since no patches are currently available, Siemens customers should engage with Siemens support for updates or interim security advisories. Additionally, organizations should consider deploying compensating controls such as intrusion detection systems (IDS) tailored to industrial protocols used by these devices. Regular security audits and penetration testing focused on industrial control systems can help identify exposure and validate mitigations. Finally, raising awareness among operational technology (OT) staff about this vulnerability and safe network practices is essential to reduce risk.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Finland
CVE-2025-24008: CWE-311: Missing Encryption of Sensitive Data in Siemens SIRIUS 3RK3 Modular Safety System (MSS)
Description
A vulnerability has been identified in SIRIUS 3RK3 Modular Safety System (MSS) (All versions), SIRIUS Safety Relays 3SK2 (All versions). The affected devices do not encrypt data in transit. An attacker with network access could eavesdrop the connection and retrieve sensitive information, including obfuscated safety passwords.
AI-Powered Analysis
Technical Analysis
CVE-2025-24008 is a vulnerability identified in Siemens' SIRIUS 3RK3 Modular Safety System (MSS) and SIRIUS Safety Relays 3SK2 across all versions. The core issue is the absence of encryption for data transmitted between devices, which constitutes a CWE-311 weakness (Missing Encryption of Sensitive Data). This lack of encryption allows an attacker with network access to eavesdrop on communications and potentially retrieve sensitive information, including obfuscated safety passwords. The vulnerability is exploitable remotely over the network without requiring prior authentication, although user interaction is necessary to trigger the exploit. The CVSS 3.1 base score is 6.5 (medium severity), reflecting high confidentiality impact but no impact on integrity or availability. The vulnerability affects safety-critical industrial control systems used in automation and safety applications, where confidentiality of safety passwords and command data is essential to prevent unauthorized control or sabotage. No patches are currently available, and no known exploits have been observed in the wild. The vulnerability was publicly disclosed on May 13, 2025, with the issue reserved earlier in January 2025. Siemens devices affected are widely used in industrial environments, including manufacturing plants, critical infrastructure, and process automation, where secure communication is paramount to maintain operational safety and prevent industrial espionage or sabotage.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially in sectors relying on industrial automation and safety systems such as manufacturing, energy, transportation, and critical infrastructure. The ability to intercept sensitive data like safety passwords could enable attackers to gain unauthorized insight into safety system configurations or potentially facilitate further attacks by leveraging exposed credentials. Although the vulnerability does not directly allow modification of commands or disruption of operations, the confidentiality breach could lead to espionage, intellectual property theft, or preparation for more damaging attacks. Given the critical role of Siemens SIRIUS MSS and Safety Relays in European industrial environments, exploitation could undermine trust in safety systems and cause regulatory and compliance issues under GDPR and NIS Directive frameworks. The medium severity rating suggests a moderate but non-negligible threat level, warranting timely mitigation to prevent escalation or combined attacks.
Mitigation Recommendations
European organizations should implement network segmentation to isolate Siemens SIRIUS MSS and Safety Relays from general IT networks, limiting exposure to untrusted network segments. Employing VPNs or secure tunnels for remote access can add encryption layers to mitigate the lack of native encryption. Monitoring network traffic for unusual eavesdropping or scanning activities targeting these devices is critical. Organizations should also enforce strict access controls and limit network access to authorized personnel and systems only. Since no patches are currently available, Siemens customers should engage with Siemens support for updates or interim security advisories. Additionally, organizations should consider deploying compensating controls such as intrusion detection systems (IDS) tailored to industrial protocols used by these devices. Regular security audits and penetration testing focused on industrial control systems can help identify exposure and validate mitigations. Finally, raising awareness among operational technology (OT) staff about this vulnerability and safe network practices is essential to reduce risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2025-01-16T16:19:30.407Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fc1484d88663aecca8
Added to database: 5/20/2025, 6:59:08 PM
Last enriched: 7/6/2025, 6:27:41 PM
Last updated: 1/7/2026, 4:24:07 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.