First published: Tue Sep 14 2021(Updated: )
A vulnerability has been identified in SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP100 (All versions < V8.80), SIPROTEC 5 relays with CPU variants CP300 (All versions < V8.80). Specially crafted packets sent to port 4443/tcp could cause a Denial-of-Service condition or potential remote code execution.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens SIPROTEC 5 | <8.80 | |
Siemens SIPROTEC 5 with CPU variant CP100 | <8.80 | |
Siemens SIPROTEC 5 with CPU variant CP300 | <8.80 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-33719.
The affected software is Siemens SIPROTEC 5 relays with CPU variants CP050 (All versions < V8.80), CP100 (All versions < V8.80), and CP300 (All versions < V8.80).
The severity of CVE-2021-33719 is critical, with a CVSS score of 9.8.
The vulnerability can be exploited by sending specially crafted packets to port 4443/tcp.
Siemens has not provided any specific fixes for this vulnerability, but organizations are advised to refer to the provided reference for any updates or patches.