CVE-2025-40753
📋 TL;DR
This vulnerability exposes SMTP account passwords in plain text within configuration files on Siemens SICAM Q100 and Q200 power meters. An authenticated local attacker could extract these credentials and misuse the SMTP service for unauthorized email transmission. Affected devices include specific SICAM Q100 models (7KG9501 variants) and the Q200 family running vulnerable firmware versions.
💻 Affected Systems
- POWER METER SICAM Q100 (7KG9501-0AA01-0AA1)
- POWER METER SICAM Q100 (7KG9501-0AA01-2AA1)
- POWER METER SICAM Q100 (7KG9501-0AA31-0AA1)
- POWER METER SICAM Q100 (7KG9501-0AA31-2AA1)
- POWER METER SICAM Q200 family
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker could steal SMTP credentials, send spam/phishing emails from the device's SMTP service, potentially compromising email infrastructure reputation and enabling further attacks.
Likely Case
Malicious insider or compromised account could extract SMTP passwords to send unauthorized emails, potentially for data exfiltration or phishing campaigns.
If Mitigated
With proper access controls and network segmentation, impact is limited to internal email misuse with no external compromise.
🎯 Exploit Status
Exploitation requires authenticated access to device configuration files. No public exploit code available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Q100: V2.62 or later, Q200: V2.80 or later
Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-529291.html
Restart Required: No
Instructions:
1. Download firmware update from Siemens support portal. 2. Follow device-specific update procedure. 3. Verify firmware version after update.
🔧 Temporary Workarounds
Disable SMTP Configuration
allRemove or disable SMTP account configuration on affected devices
Restrict Configuration File Access
allImplement strict access controls to prevent unauthorized users from accessing device configuration files
🧯 If You Can't Patch
- Implement network segmentation to isolate affected devices from email infrastructure
- Monitor SMTP traffic from affected devices for anomalous activity
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface or CLI. If version falls within vulnerable ranges and SMTP is configured, device is vulnerable.
Check Version:
Device-specific command via web interface or CLI (consult Siemens documentation)
Verify Fix Applied:
After update, confirm firmware version is V2.62+ for Q100 or V2.80+ for Q200. Check configuration files no longer contain plaintext SMTP passwords.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access to configuration files
- Unusual SMTP connection attempts from device
Network Indicators:
- Anomalous SMTP traffic patterns from power meter devices
SIEM Query:
source_ip IN [power_meter_ips] AND protocol=SMTP AND (destination_port=25 OR destination_port=587) AND NOT destination_ip IN [allowed_smtp_servers]