<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SIPROTEC 5 7SA87 (CP200) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/siprotec-5-7sa87-cp200/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 15:08:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/siprotec-5-7sa87-cp200/feed.xml" rel="self" type="application/rss+xml"/><item><title>Siemens SIPROTEC 5 Insufficient Session ID Randomness Leads to Session Hijacking (CVE-2024-54017)</title><link>https://feed.craftedsignal.io/briefs/2026-05-siemens-siprotec5-session-hijacking/</link><pubDate>Thu, 14 May 2026 15:08:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-siemens-siprotec5-session-hijacking/</guid><description>Siemens SIPROTEC 5 devices are vulnerable to session hijacking (CVE-2024-54017) due to the use of insufficiently random numbers in session identifier generation, potentially allowing an unauthenticated remote attacker to brute-force a valid session and gain unauthorized read access.</description><content:encoded><![CDATA[<p>Multiple Siemens SIPROTEC 5 devices are affected by a vulnerability (CVE-2024-54017) stemming from the use of insufficiently random numbers in generating session identifiers. This weakness could be exploited by an unauthenticated remote attacker to conduct a brute-force attack against a valid session identifier. Successful exploitation grants the attacker unauthorized read access to limited information from the web server. The affected products include a range of SIPROTEC 5 devices, specifically versions below V11.0 for certain models. Siemens is preparing fixes and recommends countermeasures where fixes are not yet available. This vulnerability impacts critical infrastructure sectors, particularly critical manufacturing, where these devices are deployed worldwide.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable SIPROTEC 5 device exposed on a network.</li>
<li>The attacker sends an initial HTTP request to the device&rsquo;s web server to initiate a session.</li>
<li>The device generates a session identifier based on an insufficiently random number generator.</li>
<li>The attacker begins a brute-force attack, attempting different session identifier values.</li>
<li>The attacker sends subsequent HTTP requests with each guessed session identifier.</li>
<li>If a guessed session identifier matches a valid active session, the device grants the attacker access.</li>
<li>The attacker gains unauthorized read access to limited information from the web server.</li>
<li>The attacker may be able to glean sensitive configuration details or operational data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-54017 could allow an unauthenticated attacker to gain unauthorized read access to sensitive information from vulnerable Siemens SIPROTEC 5 devices. The impact is limited to read access, but exposed configuration data or operational parameters could provide valuable information to an attacker for further malicious activity. The vulnerability affects a wide range of SIPROTEC 5 devices deployed globally, particularly in critical manufacturing sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available updates to V11.0 or later versions for affected SIPROTEC 5 devices as provided by Siemens to remediate CVE-2024-54017.</li>
<li>Monitor web server logs for unusual patterns of requests with different session identifiers, indicative of brute-force attempts targeting CVE-2024-54017. Use the provided Sigma rule to detect these patterns.</li>
<li>Implement network segmentation and firewalls to restrict access to SIPROTEC 5 devices and minimize network exposure, as mentioned in the CISA advisory.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ics</category><category>session hijacking</category><category>cve-2024-54017</category><category>siemens</category><category>critical infrastructure</category></item></channel></rss>