CVE-2025-40752

6.2 MEDIUM

📋 TL;DR

This vulnerability allows authenticated local attackers to extract plain-text SMTP passwords from Siemens SICAM Q100/Q200 power meters. Attackers could then misuse the SMTP service for spam, phishing, or data exfiltration. Affected are specific SICAM Q100 and Q200 models running vulnerable firmware versions.

💻 Affected Systems

Products:
  • POWER METER SICAM Q100 (7KG9501-0AA01-0AA1)
  • POWER METER SICAM Q100 (7KG9501-0AA01-2AA1)
  • POWER METER SICAM Q100 (7KG9501-0AA31-0AA1)
  • POWER METER SICAM Q100 (7KG9501-0AA31-2AA1)
  • POWER METER SICAM Q200 family
Versions: Q100: >= V2.60 < V2.62, Q200: >= V2.70 < V2.80
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with SMTP configuration in affected firmware versions are vulnerable. Requires local authenticated access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains SMTP credentials, uses the service for large-scale spam/phishing campaigns, potentially causing reputational damage, blacklisting, or enabling further attacks via email.

🟠

Likely Case

Local authenticated user extracts SMTP password, uses it for unauthorized email sending or reconnaissance of email infrastructure.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to internal misuse with minimal external effect.

🌐 Internet-Facing: LOW - These are industrial devices typically not directly internet-facing, though SMTP misuse could affect external email systems.
🏢 Internal Only: MEDIUM - Requires local authenticated access, but successful exploitation could affect internal email services and enable lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated local access to the device. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Q100: V2.62 or later, Q200: V2.80 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-529291.html

Restart Required: No

Instructions:

1. Download firmware update from Siemens Industrial Security. 2. Follow Siemens update procedures for SICAM devices. 3. Apply firmware update to affected devices. 4. Verify firmware version after update.

🔧 Temporary Workarounds

Disable SMTP functionality

all

Remove or disable SMTP configuration on affected devices if email alerts are not required.

Use device web interface or configuration tool to disable SMTP settings

Implement network segmentation

all

Restrict device network access to prevent unauthorized local access and limit SMTP communication.

Configure firewall rules to limit device access to authorized management systems only

🧯 If You Can't Patch

  • Implement strict access controls to limit who can authenticate to affected devices
  • Monitor SMTP traffic from these devices for unusual activity or volume spikes

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or management software. If version falls in vulnerable range and SMTP is configured, device is vulnerable.

Check Version:

Use Siemens SICAM configuration tools or web interface to check firmware version

Verify Fix Applied:

Confirm firmware version is Q100 V2.62+ or Q200 V2.80+ after update. Verify SMTP functionality still works if needed.

📡 Detection & Monitoring

Log Indicators:

  • Multiple authentication attempts to device management interface
  • Configuration changes to SMTP settings
  • Unusual access patterns to device configuration

Network Indicators:

  • SMTP traffic from industrial devices to unexpected destinations
  • Unusual volume of email traffic from device IPs

SIEM Query:

source_ip IN [device_ips] AND (protocol="SMTP" OR destination_port=25 OR destination_port=587) AND volume > threshold

🔗 References

📤 Share & Export