CVE-2024-52504
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-12

Last updated on: 2025-08-12

Assigner: Siemens AG

Description
A vulnerability has been identified in SIPROTEC 4 6MD61 (All versions), SIPROTEC 4 6MD63 (All versions), SIPROTEC 4 6MD66 (All versions), SIPROTEC 4 6MD665 (All versions), SIPROTEC 4 7SA522 (All versions), SIPROTEC 4 7SA6 (All versions < V4.78), SIPROTEC 4 7SD5 (All versions < V4.78), SIPROTEC 4 7SD610 (All versions < V4.78), SIPROTEC 4 7SJ61 (All versions), SIPROTEC 4 7SJ62 (All versions), SIPROTEC 4 7SJ63 (All versions), SIPROTEC 4 7SJ64 (All versions), SIPROTEC 4 7SJ66 (All versions), SIPROTEC 4 7SS52 (All versions), SIPROTEC 4 7ST6 (All versions), SIPROTEC 4 7UM61 (All versions), SIPROTEC 4 7UM62 (All versions), SIPROTEC 4 7UT612 (All versions), SIPROTEC 4 7UT613 (All versions), SIPROTEC 4 7UT63 (All versions), SIPROTEC 4 7VE6 (All versions), SIPROTEC 4 7VK61 (All versions), SIPROTEC 4 7VU683 (All versions), SIPROTEC 4 Compact 7RW80 (All versions), SIPROTEC 4 Compact 7SD80 (All versions), SIPROTEC 4 Compact 7SJ80 (All versions), SIPROTEC 4 Compact 7SJ81 (All versions), SIPROTEC 4 Compact 7SK80 (All versions), SIPROTEC 4 Compact 7SK81 (All versions). Affected devices do not properly handle interrupted operations of file transfer. This could allow an unauthenticated remote attacker to cause a denial of service condition. To restore normal operations, the devices need to be restarted.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-12
Last Modified
2025-08-12
Generated
2026-05-07
AI Q&A
2025-08-12
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 29 associated CPEs
Vendor Product Version / Range
siemens siprotect_4_compact 7sk81
siemens siprotect_4 7ve6
siemens siprotect_4 7vk61
siemens siprotect_4 7ss52
siemens siprotect_4 7sj62
siemens siprotect_4 7ut612
siemens siprotect_4 7ut63
siemens siprotect_4_compact 7sk80
siemens siprotect_4 7um62
siemens siprotect_4 7um61
siemens siprotect_4 6md61
siemens siprotect_4 7sj66
siemens siprotect_4 6md665
siemens siprotect_4_compact 7sj80
siemens siprotect_4 7sd5
siemens siprotect_4 6md63
siemens siprotect_4 7sa522
siemens siprotect_4 6md66
siemens siprotect_4_compact 7sd80
siemens siprotect_4 7sj63
siemens siprotect_4_compact 7sj81
siemens siprotect_4 7vu683
siemens siprotect_4 7sj64
siemens siprotect_4 7sd610
siemens siprotect_4_compact 7rw80
siemens siprotect_4 7sa6
siemens siprotect_4 7sj61
siemens siprotect_4 7st6
siemens siprotect_4 7ut613
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-754 The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects various SIPROTEC 4 and SIPROTEC 4 Compact devices used in electrical substations. The devices do not properly handle interrupted file transfer operations, which allows an unauthenticated remote attacker to cause a denial of service (DoS) condition. When exploited, the affected device stops functioning normally and requires a restart to restore operations. [1]


How can this vulnerability impact me? :

The impact of this vulnerability is a denial of service condition on the affected SIPROTEC devices. An attacker can remotely cause the devices to stop functioning properly without authentication, potentially disrupting protection, control, measurement, and automation functions in electrical substations. This disruption could affect the reliability and availability of critical power infrastructure until the device is restarted. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The provided resources do not include specific detection methods or commands to identify this vulnerability on your network or system. Detection would likely involve monitoring for denial of service conditions caused by interrupted file transfer operations on affected SIPROTEC 4 devices, but no explicit commands or tools are suggested. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying available security updates where provided, especially updating SIPROTEC 4 models 7SA6, 7SD5, and 7SD610 to version V4.78 or later. For devices without available fixes, implement general security measures such as network segmentation, firewalls, VPNs, and follow operational guidelines to protect devices within a secure IT environment. Additionally, ensure multi-level redundant secondary protection schemes are in place to maintain grid resilience and minimize cyber incident risks. If a denial of service occurs, restarting the affected device restores normal operations. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart