CVE-2024-52504

Aug. 12, 2025, 2:25 p.m.

8.7
High

Description

A vulnerability has been identified in SIPROTEC 4 6MD61 (All versions), SIPROTEC 4 6MD63 (All versions), SIPROTEC 4 6MD66 (All versions), SIPROTEC 4 6MD665 (All versions), SIPROTEC 4 7SA522 (All versions), SIPROTEC 4 7SA6 (All versions < V4.78), SIPROTEC 4 7SD5 (All versions < V4.78), SIPROTEC 4 7SD610 (All versions < V4.78), SIPROTEC 4 7SJ61 (All versions), SIPROTEC 4 7SJ62 (All versions), SIPROTEC 4 7SJ63 (All versions), SIPROTEC 4 7SJ64 (All versions), SIPROTEC 4 7SJ66 (All versions), SIPROTEC 4 7SS52 (All versions), SIPROTEC 4 7ST6 (All versions), SIPROTEC 4 7UM61 (All versions), SIPROTEC 4 7UM62 (All versions), SIPROTEC 4 7UT612 (All versions), SIPROTEC 4 7UT613 (All versions), SIPROTEC 4 7UT63 (All versions), SIPROTEC 4 7VE6 (All versions), SIPROTEC 4 7VK61 (All versions), SIPROTEC 4 7VU683 (All versions), SIPROTEC 4 Compact 7RW80 (All versions), SIPROTEC 4 Compact 7SD80 (All versions), SIPROTEC 4 Compact 7SJ80 (All versions), SIPROTEC 4 Compact 7SJ81 (All versions), SIPROTEC 4 Compact 7SK80 (All versions), SIPROTEC 4 Compact 7SK81 (All versions). Affected devices do not properly handle interrupted operations of file transfer. This could allow an unauthenticated remote attacker to cause a denial of service condition. To restore normal operations, the devices need to be restarted.

Product(s) Impacted

Vendor Product Versions
Siemens
  • Siprotec 4 6md61
  • Siprotec 4 6md63
  • Siprotec 4 6md66
  • Siprotec 4 6md665
  • Siprotec 4 7sa522
  • Siprotec 4 7sa6
  • Siprotec 4 7sd5
  • Siprotec 4 7sd610
  • Siprotec 4 7sj61
  • Siprotec 4 7sj62
  • Siprotec 4 7sj63
  • Siprotec 4 7sj64
  • Siprotec 4 7sj66
  • Siprotec 4 7ss52
  • Siprotec 4 7st6
  • Siprotec 4 7um61
  • Siprotec 4 7um62
  • Siprotec 4 7ut612
  • Siprotec 4 7ut613
  • Siprotec 4 7ut63
  • Siprotec 4 7ve6
  • Siprotec 4 7vk61
  • Siprotec 4 7vu683
  • Siprotec 4 Compact 7rw80
  • Siprotec 4 Compact 7sd80
  • Siprotec 4 Compact 7sj80
  • Siprotec 4 Compact 7sj81
  • Siprotec 4 Compact 7sk80
  • Siprotec 4 Compact 7sk81
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *
  • *

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-754
Improper Check for Unusual or Exceptional Conditions
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a siemens siprotec_4_6md61 / / / / / / / /
a siemens siprotec_4_6md63 / / / / / / / /
a siemens siprotec_4_6md66 / / / / / / / /
a siemens siprotec_4_6md665 / / / / / / / /
a siemens siprotec_4_7sa522 / / / / / / / /
a siemens siprotec_4_7sa6 / / / / / / / /
a siemens siprotec_4_7sd5 / / / / / / / /
a siemens siprotec_4_7sd610 / / / / / / / /
a siemens siprotec_4_7sj61 / / / / / / / /
a siemens siprotec_4_7sj62 / / / / / / / /
a siemens siprotec_4_7sj63 / / / / / / / /
a siemens siprotec_4_7sj64 / / / / / / / /
a siemens siprotec_4_7sj66 / / / / / / / /
a siemens siprotec_4_7ss52 / / / / / / / /
a siemens siprotec_4_7st6 / / / / / / / /
a siemens siprotec_4_7um61 / / / / / / / /
a siemens siprotec_4_7um62 / / / / / / / /
a siemens siprotec_4_7ut612 / / / / / / / /
a siemens siprotec_4_7ut613 / / / / / / / /
a siemens siprotec_4_7ut63 / / / / / / / /
a siemens siprotec_4_7ve6 / / / / / / / /
a siemens siprotec_4_7vk61 / / / / / / / /
a siemens siprotec_4_7vu683 / / / / / / / /
a siemens siprotec_4_compact_7rw80 / / / / / / / /
a siemens siprotec_4_compact_7sd80 / / / / / / / /
a siemens siprotec_4_compact_7sj80 / / / / / / / /
a siemens siprotec_4_compact_7sj81 / / / / / / / /
a siemens siprotec_4_compact_7sk80 / / / / / / / /
a siemens siprotec_4_compact_7sk81 / / / / / / / /

CVSS Score

8.7 / 10

CVSS Data - 4.0

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Attack Requirements: NONE
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope:
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • Exploit Maturity: NOT_DEFINED
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    View Vector String

Timeline

Published: Aug. 12, 2025, 12:15 p.m.
Last Modified: Aug. 12, 2025, 2:25 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

productcert@siemens.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.