CVE-2025-40753

6.2 MEDIUM

📋 TL;DR

This vulnerability exposes SMTP account passwords in plain text within configuration files on Siemens SICAM Q100 and Q200 power meters. An authenticated local attacker could extract these credentials and misuse the SMTP service for unauthorized email transmission. Affected devices include specific SICAM Q100 models (7KG9501 variants) and the Q200 family running vulnerable firmware versions.

💻 Affected Systems

Products:
  • POWER METER SICAM Q100 (7KG9501-0AA01-0AA1)
  • POWER METER SICAM Q100 (7KG9501-0AA01-2AA1)
  • POWER METER SICAM Q100 (7KG9501-0AA31-0AA1)
  • POWER METER SICAM Q100 (7KG9501-0AA31-2AA1)
  • POWER METER SICAM Q200 family
Versions: Q100: V2.60 to V2.62 (exclusive), Q200: V2.70 to V2.80 (exclusive)
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with SMTP configuration enabled. Requires authenticated local access to configuration files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could steal SMTP credentials, send spam/phishing emails from the device's SMTP service, potentially compromising email infrastructure reputation and enabling further attacks.

🟠

Likely Case

Malicious insider or compromised account could extract SMTP passwords to send unauthorized emails, potentially for data exfiltration or phishing campaigns.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to internal email misuse with no external compromise.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to device configuration files. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Q100: V2.62 or later, Q200: V2.80 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-529291.html

Restart Required: No

Instructions:

1. Download firmware update from Siemens support portal. 2. Follow device-specific update procedure. 3. Verify firmware version after update.

🔧 Temporary Workarounds

Disable SMTP Configuration

all

Remove or disable SMTP account configuration on affected devices

Restrict Configuration File Access

all

Implement strict access controls to prevent unauthorized users from accessing device configuration files

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected devices from email infrastructure
  • Monitor SMTP traffic from affected devices for anomalous activity

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI. If version falls within vulnerable ranges and SMTP is configured, device is vulnerable.

Check Version:

Device-specific command via web interface or CLI (consult Siemens documentation)

Verify Fix Applied:

After update, confirm firmware version is V2.62+ for Q100 or V2.80+ for Q200. Check configuration files no longer contain plaintext SMTP passwords.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to configuration files
  • Unusual SMTP connection attempts from device

Network Indicators:

  • Anomalous SMTP traffic patterns from power meter devices

SIEM Query:

source_ip IN [power_meter_ips] AND protocol=SMTP AND (destination_port=25 OR destination_port=587) AND NOT destination_ip IN [allowed_smtp_servers]

🔗 References

📤 Share & Export