CVE-2025-40742: CWE-598: Use of GET Request Method With Sensitive Query Strings in Siemens SIPROTEC 5 6MD84 (CP300)
A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions), SIPROTEC 5 6MD89 (CP300) (All versions), SIPROTEC 5 6MD89 (CP300) V9.6 (All versions), SIPROTEC 5 6MU85 (CP300) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions), SIPROTEC 5 7SJ81 (CP100) (All versions), SIPROTEC 5 7SJ81 (CP150) (All versions), SIPROTEC 5 7SJ82 (CP100) (All versions), SIPROTEC 5 7SJ82 (CP150) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions), SIPROTEC 5 7SK82 (CP100) (All versions), SIPROTEC 5 7SK82 (CP150) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions), SIPROTEC 5 7ST86 (CP300) (All versions), SIPROTEC 5 7SX82 (CP150) (All versions), SIPROTEC 5 7SX85 (CP300) (All versions), SIPROTEC 5 7SY82 (CP150) (All versions), SIPROTEC 5 7UM85 (CP300) (All versions), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions), SIPROTEC 5 7VE85 (CP300) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions), SIPROTEC 5 7VU85 (CP300) (All versions), SIPROTEC 5 Compact 7SX800 (CP050) (All versions). The affected devices include session identifiers in URL requests for certain functionalities. This could allow an attacker to retrieve sensitive session data from browser history, logs, or other storage mechanisms, potentially leading to unauthorized access.
AI Analysis
Technical Summary
CVE-2025-40742 is a medium-severity vulnerability affecting multiple versions of Siemens SIPROTEC 5 devices, specifically models including but not limited to 6MD84 (CP300), 6MD85, 7SA82, 7SD82, 7SJ81, 7SK82, 7SL82, 7ST85, 7SX82, 7UT82, 7VE85, and Compact 7SX800 (CP050). These devices are widely used in electrical power protection and automation systems. The vulnerability arises from the use of the HTTP GET request method to transmit sensitive session identifiers within URL query strings. This practice is classified under CWE-598, which highlights the risk of sensitive data exposure through URL parameters. Because URLs can be logged in browser history, server logs, proxy logs, and other monitoring tools, session identifiers embedded in URLs can be inadvertently exposed to unauthorized parties. An attacker who gains access to these logs or browser histories could extract session tokens and potentially hijack active sessions, leading to unauthorized access to the device's management interfaces or control functions. The CVSS v3.1 base score of 5.3 reflects a medium severity, with network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and user interaction required (UI:R). The impact is primarily on confidentiality (C:H), with no direct impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects all versions of the listed devices, indicating a systemic design issue in how session management is handled in the affected Siemens SIPROTEC 5 products. Given the critical role of these devices in power grid protection and automation, unauthorized access could have serious operational consequences if exploited.
Potential Impact
For European organizations, especially those operating critical infrastructure such as electrical utilities and grid operators, this vulnerability poses a significant confidentiality risk. Unauthorized access to SIPROTEC 5 devices could allow attackers to monitor or manipulate protection settings, potentially leading to misoperation or failure to respond correctly to grid faults. Although the vulnerability does not directly affect integrity or availability, session hijacking could be a stepping stone for more advanced attacks or lateral movement within industrial control networks. The exposure of session identifiers in URLs increases the risk of credential leakage through routine network monitoring, browser history, or log file access. European power utilities are often subject to strict regulatory requirements for cybersecurity under frameworks like NIS2 and the EU Cybersecurity Act, making mitigation of such vulnerabilities critical to maintaining compliance and operational security. The medium severity score suggests that while exploitation requires user interaction and has high complexity, the potential impact on confidentiality and the critical nature of the affected systems warrant prompt attention.
Mitigation Recommendations
1. Siemens and affected organizations should prioritize the development and deployment of patches or firmware updates that eliminate the use of GET requests for transmitting session identifiers, switching instead to more secure methods such as HTTP POST or using secure cookies with appropriate flags (HttpOnly, Secure). 2. Network segmentation should be enforced to isolate SIPROTEC devices from general IT networks and limit access to trusted administrators only. 3. Implement strict access controls and multi-factor authentication (MFA) for device management interfaces to reduce the risk of unauthorized access even if session tokens are compromised. 4. Regularly audit and sanitize logs and browser histories to minimize the retention of sensitive URL data. 5. Employ network monitoring and anomaly detection to identify unusual access patterns or session hijacking attempts. 6. Educate operators and administrators on the risks of session token exposure and safe browsing practices when accessing device management portals. 7. Where possible, use VPNs or encrypted tunnels for remote access to SIPROTEC devices to protect session data in transit. 8. Review and update incident response plans to include scenarios involving session hijacking or unauthorized access to industrial control systems.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Czech Republic
CVE-2025-40742: CWE-598: Use of GET Request Method With Sensitive Query Strings in Siemens SIPROTEC 5 6MD84 (CP300)
Description
A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions), SIPROTEC 5 6MD86 (CP300) (All versions), SIPROTEC 5 6MD89 (CP300) (All versions), SIPROTEC 5 6MD89 (CP300) V9.6 (All versions), SIPROTEC 5 6MU85 (CP300) (All versions), SIPROTEC 5 7KE85 (CP300) (All versions), SIPROTEC 5 7SA82 (CP100) (All versions), SIPROTEC 5 7SA82 (CP150) (All versions), SIPROTEC 5 7SA86 (CP300) (All versions), SIPROTEC 5 7SA87 (CP300) (All versions), SIPROTEC 5 7SD82 (CP100) (All versions), SIPROTEC 5 7SD82 (CP150) (All versions), SIPROTEC 5 7SD86 (CP300) (All versions), SIPROTEC 5 7SD87 (CP300) (All versions), SIPROTEC 5 7SJ81 (CP100) (All versions), SIPROTEC 5 7SJ81 (CP150) (All versions), SIPROTEC 5 7SJ82 (CP100) (All versions), SIPROTEC 5 7SJ82 (CP150) (All versions), SIPROTEC 5 7SJ85 (CP300) (All versions), SIPROTEC 5 7SJ86 (CP300) (All versions), SIPROTEC 5 7SK82 (CP100) (All versions), SIPROTEC 5 7SK82 (CP150) (All versions), SIPROTEC 5 7SK85 (CP300) (All versions), SIPROTEC 5 7SL82 (CP100) (All versions), SIPROTEC 5 7SL82 (CP150) (All versions), SIPROTEC 5 7SL86 (CP300) (All versions), SIPROTEC 5 7SL87 (CP300) (All versions), SIPROTEC 5 7SS85 (CP300) (All versions), SIPROTEC 5 7ST85 (CP300) (All versions), SIPROTEC 5 7ST86 (CP300) (All versions), SIPROTEC 5 7SX82 (CP150) (All versions), SIPROTEC 5 7SX85 (CP300) (All versions), SIPROTEC 5 7SY82 (CP150) (All versions), SIPROTEC 5 7UM85 (CP300) (All versions), SIPROTEC 5 7UT82 (CP100) (All versions), SIPROTEC 5 7UT82 (CP150) (All versions), SIPROTEC 5 7UT85 (CP300) (All versions), SIPROTEC 5 7UT86 (CP300) (All versions), SIPROTEC 5 7UT87 (CP300) (All versions), SIPROTEC 5 7VE85 (CP300) (All versions), SIPROTEC 5 7VK87 (CP300) (All versions), SIPROTEC 5 7VU85 (CP300) (All versions), SIPROTEC 5 Compact 7SX800 (CP050) (All versions). The affected devices include session identifiers in URL requests for certain functionalities. This could allow an attacker to retrieve sensitive session data from browser history, logs, or other storage mechanisms, potentially leading to unauthorized access.
AI-Powered Analysis
Technical Analysis
CVE-2025-40742 is a medium-severity vulnerability affecting multiple versions of Siemens SIPROTEC 5 devices, specifically models including but not limited to 6MD84 (CP300), 6MD85, 7SA82, 7SD82, 7SJ81, 7SK82, 7SL82, 7ST85, 7SX82, 7UT82, 7VE85, and Compact 7SX800 (CP050). These devices are widely used in electrical power protection and automation systems. The vulnerability arises from the use of the HTTP GET request method to transmit sensitive session identifiers within URL query strings. This practice is classified under CWE-598, which highlights the risk of sensitive data exposure through URL parameters. Because URLs can be logged in browser history, server logs, proxy logs, and other monitoring tools, session identifiers embedded in URLs can be inadvertently exposed to unauthorized parties. An attacker who gains access to these logs or browser histories could extract session tokens and potentially hijack active sessions, leading to unauthorized access to the device's management interfaces or control functions. The CVSS v3.1 base score of 5.3 reflects a medium severity, with network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), and user interaction required (UI:R). The impact is primarily on confidentiality (C:H), with no direct impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects all versions of the listed devices, indicating a systemic design issue in how session management is handled in the affected Siemens SIPROTEC 5 products. Given the critical role of these devices in power grid protection and automation, unauthorized access could have serious operational consequences if exploited.
Potential Impact
For European organizations, especially those operating critical infrastructure such as electrical utilities and grid operators, this vulnerability poses a significant confidentiality risk. Unauthorized access to SIPROTEC 5 devices could allow attackers to monitor or manipulate protection settings, potentially leading to misoperation or failure to respond correctly to grid faults. Although the vulnerability does not directly affect integrity or availability, session hijacking could be a stepping stone for more advanced attacks or lateral movement within industrial control networks. The exposure of session identifiers in URLs increases the risk of credential leakage through routine network monitoring, browser history, or log file access. European power utilities are often subject to strict regulatory requirements for cybersecurity under frameworks like NIS2 and the EU Cybersecurity Act, making mitigation of such vulnerabilities critical to maintaining compliance and operational security. The medium severity score suggests that while exploitation requires user interaction and has high complexity, the potential impact on confidentiality and the critical nature of the affected systems warrant prompt attention.
Mitigation Recommendations
1. Siemens and affected organizations should prioritize the development and deployment of patches or firmware updates that eliminate the use of GET requests for transmitting session identifiers, switching instead to more secure methods such as HTTP POST or using secure cookies with appropriate flags (HttpOnly, Secure). 2. Network segmentation should be enforced to isolate SIPROTEC devices from general IT networks and limit access to trusted administrators only. 3. Implement strict access controls and multi-factor authentication (MFA) for device management interfaces to reduce the risk of unauthorized access even if session tokens are compromised. 4. Regularly audit and sanitize logs and browser histories to minimize the retention of sensitive URL data. 5. Employ network monitoring and anomaly detection to identify unusual access patterns or session hijacking attempts. 6. Educate operators and administrators on the risks of session token exposure and safe browsing practices when accessing device management portals. 7. Where possible, use VPNs or encrypted tunnels for remote access to SIPROTEC devices to protect session data in transit. 8. Review and update incident response plans to include scenarios involving session hijacking or unauthorized access to industrial control systems.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2025-04-16T08:39:30.029Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686cf5646f40f0eb72f3f621
Added to database: 7/8/2025, 10:39:32 AM
Last enriched: 7/15/2025, 10:01:22 PM
Last updated: 8/20/2025, 6:51:13 PM
Views: 30
Related Threats
CVE-2025-51606: n/a
CriticalCVE-2025-43747: CWE-918 Server-Side Request Forgery (SSRF) in Liferay DXP
MediumCVE-2025-27714: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumCVE-2025-24489: CWE-434 in INFINITT Healthcare INFINITT PACS System Manager
MediumCVE-2025-55231: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows Server 2019
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.