Skip to content
  Thursday 22 May 2025
Trending
January 1, 2022Freedom APK Free Download v3.2.2 2022 – No Root Requried January 10, 2025<h3>Showdown Ahead: Unveiling Chinese Cyberthreats</h3> September 13, 2023DOD Cyber Strategy Focuses on Disrupting Hackers and Strengthening Ally Cooperation March 27, 2025<h3>Elevating MFA Adoption Through Strategic Risk Messaging<br /></h3> <p><br /> In the ever-evolving landscape of cybersecurity, Multi-Factor Authentication (MFA) stands as a crucial line of defense against unauthorized access. However, encouraging widespread adoption of this security measure remains a challenge for many organizations. A key strategy to overcome this hurdle is the implementation of effective risk messaging. By clearly communicating the potential risks of not using MFA, companies can significantly enhance user acceptance and integration.<br /> <br /> Risk messaging serves as a powerful tool that can bridge the gap between technical solutions and user understanding. It emphasizes the tangible threats that users face if MFA is not employed, such as data breaches and identity theft. By presenting these risks in relatable terms, organizations can help users appreciate the importance of MFA in safeguarding their personal and professional information.<br /> <br /> Moreover, tailoring risk messages to specific user groups can further improve MFA adoption rates. Different users may have varying levels of technical expertise and risk perception. By customizing messages to address these differences, organizations can create a more compelling narrative that resonates with each audience. This targeted approach not only increases user engagement but also fosters a culture of security awareness.<br /> <br /> In addition to risk messaging, providing clear and straightforward guidance on implementing MFA can alleviate user apprehension. Many users may perceive MFA as cumbersome or complicated. By simplifying the setup process and offering step-by-step instructions, organizations can minimize resistance and encourage a smoother transition to MFA usage.<br /> <br /> Ultimately, the integration of well-crafted risk messaging with user-friendly MFA solutions can transform user attitudes toward cybersecurity. As organizations strive to protect sensitive information in an increasingly digital world, fostering a deeper understanding of the risks and benefits associated with MFA will be essential. Through these efforts, businesses can build a more secure environment for both their employees and customers.</p> March 1, 2025Senior Cybersecurity Engineer (Hybrid) November 30, 2024Director, Cybersecurity Strategy, Architecture and Engineering August 6, 2024Account Executive – Secureworks Cybersecurity Sales – US Remote Philadelphia January 2, 2022How to Hack a Twitter Account 2022 – Top 6 Working Methods August 10, 2023Siemens Address Processing in SIMATIC March 4, 2025Lead Cybersecurity Detection Engineer
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  Siemens RADIUS Client of SIPROTEC 5 Devices
Threat Advisories

Siemens RADIUS Client of SIPROTEC 5 Devices

Mister CybersecurityMister Cybersecurity—March 21, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).

1. EXECUTIVE SUMMARY

  • CVSS v3 7.5
  • ATTENTION: Exploitable remotely/low attack complexity 
  • Vendor: Siemens ProductCERT 
  • Equipment: RADIUS client of SIPROTEC 5 devices 
  • Vulnerability: Loop with Unreachable Exit Condition (‘Infinite Loop’) 

2. RISK EVALUATION

The RADIUS client implementation of the VxWorks platform in SIPROTEC 5 devices contains a denial-of-service vulnerability that could be triggered when a specially crafted packet is sent by a RADIUS server. 

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following software from Siemens is affected: 

  • SIPROTEC 5 6MD85 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 6MD86 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 6MD89 (CP300) – >= V7.80 
  • SIPROTEC 5 6MU85 (CP300) – >= V7.90 < V9.30 
  • SIPROTEC 5 7KE85 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7SA86 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7SA87 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7SD86 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7SD87 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7SJ85 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7SJ86 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7SK85 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7SL86 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7SL87 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7SS85 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7ST85 (CP300) – >= V8.81 < V9.30 
  • SIPROTEC 5 7ST86 (CP300) – >= V9.20 < V9.30 
  • SIPROTEC 5 7SX85 (CP300) – >= V8.30 < V9.30 
  • SIPROTEC 5 7UM85 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7UT85 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7UT86 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7UT87 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7VE85 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 7VK87 (CP300) – >= V7.80 < V9.30 
  • SIPROTEC 5 Communication Module ETH-BA-2EL – >= V7.80 < V9.30 
  • SIPROTEC 5 Communication Module ETH-BB-2FO – >= V7.80 < V9.30 
  • SIPROTEC 5 Communication Module ETH-BD-2FO – >= V7.80 < V9.30 
  • SIPROTEC 5 Compact 7SX800 (CP050) – >= V8.70 < V9.30 

3.2 VULNERABILITY OVERVIEW

3.2.1 LOOP WITH UNREACHABLE EXIT CONDITION (‘INFINITE LOOP’) CWE-835 

An issue was discovered in Wind River VxWorks 6.9 and 7 that allows a specifically crafted packet sent by a RADIUS server, which could cause a denial-of-service condition during the IP Radius access procedure. 

CVE-2022-38767 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). 

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Energy 
  • COUNTRIES/AREAS DEPLOYED: Worldwide 
  • COMPANY HEADQUARTERS LOCATION: Germany 

3.4 RESEARCHER

Siemens reported this vulnerability to CISA. 

4. MITIGATIONS

Siemens has identified the following specific workarounds and mitigations users can apply to reduce risk: 

  • SIPROTEC 5 6MD85 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 6MD86 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 6MD89 (CP300): Currently no fix is planned 
  • SIPROTEC 5 6MU85 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7KE85 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7SA86 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7SA87 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7SD86 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7SD87 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7SJ85 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7SJ86 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7SK85 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7SL86 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7SL87 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7SS85 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7ST85 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7ST86 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7SX85 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7UM85 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7UT85 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7UT86 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7UT87 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7VE85 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 7VK87 (CP300): Update to V9.30 or later version 
  • SIPROTEC 5 Communication Module ETH-BA-2EL: Update to V9.30 or later version 
  • SIPROTEC 5 Communication Module ETH-BB-2FO: Update to V9.30 or later version 
  • SIPROTEC 5 Communication Module ETH-BD-2FO: Update to V9.30 or later version 
  • SIPROTEC 5 Compact 7SX800 (CP050): Update to V9.30 or later version 
  • Protect the pre-shared key for RADIUS from unauthorized access 
  • Ensure that only a trusted, properly hardened RADIUS server is configured in your environment 
More stories

Johnson Controls Software House iStar Pro Door Controller

June 6, 2024

Cisco Releases Security Advisories for Multiple Products

March 23, 2023

Mitsubishi Electric MELSEC iQ-F FX5-OPC

October 1, 2024

Siemens RUGGEDCOM ROX II | CISA

May 16, 2025

Operators of critical power systems (e.g. TSOs or DSOs) worldwide are usually required by regulations to build resilience into the power grids by applying multi-level redundant secondary protection schemes. It is therefore recommended that the operators check whether appropriate resilient protection measures are in place. The risk of cyber incidents impacting the grid’s reliability can thus be minimized by virtue of the grid design.  

Siemens strongly recommends applying the provided security updates using the corresponding tooling and documented procedures made available with the product. If supported by the product, an automated means to apply the security updates across multiple product instances may be used. Siemens strongly recommends prior validation of any security update before being applied, and supervision by trained staff of the update process in the target environment.  As a general security measure  

Siemens strongly recommends users protect network access with appropriate mechanisms (e.g. firewalls, segmentation, VPNs). It is advised to configure the environment according to our operational guidelines to run the devices in a protected IT environment.  Recommended security guidelines can be found at the Siemens webpage for grid security. 

For further inquiries on security vulnerabilities in Siemens products and solutions, users should contact the Siemens ProductCERT.  

For more information, see the associated Siemens security advisory SSA-726834 in HTML and CSAF. 

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:

  • Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet.
  • Locate control system networks and remote devices behind firewalls and isolate them from business networks.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks: 

No known public exploits specifically target this vulnerability. 



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

VISAM VBASE Automation Base | CISA
Siemens SCALANCE Third-Party | CISA
Related posts
  • Related posts
  • More from author
Threat Advisories

Threat Actors Target U.S. Critical Infrastructure with LummaC2 Malware

May 21, 20250
Threat Advisories

Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations

May 21, 20250
Threat Advisories

Russian GRU Targeting Western Logistics Entities and Technology Companies

May 21, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

The importance of staying active and maintaining a healthy lifestyle cannot be understated. Regular exercise not only helps to keep our bodies in shape, but also has a multitude of benefits for our mental and emotional wellbeing. It is recommended that adults engage in at least 150 minutes of moderate intensity exercise per week to reap the full rewards of physical activity.

Exercise has been shown to improve cardiovascular health, increase muscle strength and flexibility, and boost overall energy levels. Regular physical activity can also help to prevent chronic diseases such as heart disease, diabetes, and obesity. In addition, engaging in exercise releases endorphins, which are known as the “feel good” hormones, helping to reduce stress and improve mood.

Incorporating various types of exercise into your routine can help to keep things interesting and prevent boredom. Activities such as running, biking, swimming, yoga, and weightlifting all offer different benefits and can target different muscle groups. Mixing up your workouts can also prevent plateaus and help to continuously challenge your body.

It is important to listen to your body and not push yourself too hard, especially if you are just starting an exercise regimen. Gradually increasing the intensity and duration of your workouts can help to prevent injury and ensure long-term success. Finding a form of exercise that you enjoy and can stick with is key to maintaining a healthy lifestyle.

In conclusion, making time for regular physical activity is essential for overall health and wellbeing. Whether it’s a brisk walk in the park, a high-intensity interval training session, or a relaxing yoga class, finding ways to stay active can greatly improve your quality of life. So lace up those sneakers, grab a workout buddy, and start reaping the benefits of a healthy, active lifestyle today.

May 22, 20250
Industry News

Identity Security Automation Crisis: Are You at Risk?

May 22, 20250
Industry News

FBI and Europol Bust Massive Malware Network with 10 Million Infections

May 22, 20250
Industry News

Record Surge in Credit Washing and Synthetic ID Fraud

May 22, 20250
Industry News

Scammers Exploit Abandoned Cloud Accounts via DNS Records

May 21, 20250
Industry News

Ohio Health System Battles Cyberattack and Fraud Scams

May 21, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • The importance of staying active and maintaining a healthy lifestyle cannot be understated. Regular exercise not only helps to keep our bodies in shape, but also has a multitude of benefits for our mental and emotional wellbeing. It is recommended that adults engage in at least 150 minutes of moderate intensity exercise per week to reap the full rewards of physical activity.

    Exercise has been shown to improve cardiovascular health, increase muscle strength and flexibility, and boost overall energy levels. Regular physical activity can also help to prevent chronic diseases such as heart disease, diabetes, and obesity. In addition, engaging in exercise releases endorphins, which are known as the “feel good” hormones, helping to reduce stress and improve mood.

    Incorporating various types of exercise into your routine can help to keep things interesting and prevent boredom. Activities such as running, biking, swimming, yoga, and weightlifting all offer different benefits and can target different muscle groups. Mixing up your workouts can also prevent plateaus and help to continuously challenge your body.

    It is important to listen to your body and not push yourself too hard, especially if you are just starting an exercise regimen. Gradually increasing the intensity and duration of your workouts can help to prevent injury and ensure long-term success. Finding a form of exercise that you enjoy and can stick with is key to maintaining a healthy lifestyle.

    In conclusion, making time for regular physical activity is essential for overall health and wellbeing. Whether it’s a brisk walk in the park, a high-intensity interval training session, or a relaxing yoga class, finding ways to stay active can greatly improve your quality of life. So lace up those sneakers, grab a workout buddy, and start reaping the benefits of a healthy, active lifestyle today.
  • Identity Security Automation Crisis: Are You at Risk?
  • FBI and Europol Bust Massive Malware Network with 10 Million Infections
  • Record Surge in Credit Washing and Synthetic ID Fraud

  • Scammers Exploit Abandoned Cloud Accounts via DNS Records

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures