SSA-794185 PUBLISHED CVSS 9 CRITICAL

This advisory documents the impact of CVE-2024-3596 (also dubbed "Blastradius"), a vulnerability in the RADIUS protocol, to SIPROTEC, SICAM and related products. The vulnerability could allow on-path attackers, located between a Network Access Server (the RADIUS client, e.g., a SICAM device) and a RADIUS server, to forge Access-Request packets in a way that enables them to modify the corresponding server response packet at will, e.g., turning an "Access-Reject" message into an "Access-Accept". This would cause the Network Access Server to grant the attackers access to the network with the attackers desired authorization (and without the need of knowing or guessing legitimate access credentials). Further details incl. external references can be found in the chapter "Additional Information". Siemens has released new versions for several affected products and recommends to update to the latest versions, and to configure the updated systems as recommended in the chapter "Additional Information". Siemens is preparing further fix versions and recommends specific countermeasures for products where fixes are not, or not yet available. See chapter "Additional Information" for details.

Risk Scores

CVSS v3.1
9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Affected Products

VendorProductVersions
SIPROTEC 5 7KE85 (CP300)
SICAM GridEdge (Classic)
Powerlink IP
CPCI85 Central Processing/Communication
POWER METER SICAM Q100 family
SIPROTEC 5 6MD89 (CP300) V9.6x
SICAM AK 3
POWER METER SICAM Q200 family
SIPROTEC 5 6MD89 (CP300)
SIPROTEC 5 - CP200 Devices
SICAM GridPass
SIPROTEC 5 6MU85 (CP300)
SIPROTEC 5 6MD86 (CP300)
CPC80 Central Processing/Communication
SICAM TM
SIPROTEC 5 6MD84 (CP300)
SICORE Base system
SIPROTEC 5 6MD85 (CP300)
SICAM GridEdge Applications for SICAM 8 Platform
SICAM BC

Timeline

References

Open in Interactive Console →