Skip to main content
Company

Siemens Spectrum Power 4 – critical Vulnerabilities discovered in SCADA- and Energy Management System

By 30. January 2026No Comments

During a security assessment for a customer, we discovered five vulnerabilities in Siemens Spectrum Power 4  a widely deployed SCADA and Energy Management System used by transmission and distribution system operators worldwide. The vulnerabilities enable both local privilege escalation and remote code execution as an application administrator. 

First: Siemens has meanwhile released V4.70 SP12 Update 2 addressing all issues. Operators running affected versions should apply the update following Siemens’ guidance.

Discovered Vulnerabilities

CVSS v4.0 Score

Produkt:

Siemens Spectrum Power 4

Betroffene Versionen:

Version 4.70 SP12 Update 2

CVE / Vendor ID:

CVE-2024-32011

Gefunden von:

Felix Eberstaller and Sixtus Leonhardsberger, Limes Security GmbH
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Remote command execution via networkaccessible UI

CVSS v4.0 Score

CVE / Vendor ID:

CVE-2024-32008

Local privilege escalation via debug interface

CVSS v4.0 Score

CVE / Vendor ID:

CVE-2024-32009

Local privilege escalation via binary misconfiguration

CVSS v4.0 Score

CVE / Vendor ID:

CVE-2024-32010

Credential extraction from worldreadable file

CVSS v4.0 Score

CVE / Vendor ID:

CVE-2024-32014

Local database manipulation

We are withholding detailed exploitation steps as many operators are still in the process of applying mitigations. However, we can share the general attack pattern for CVE202432011. 

Attack Pattern: Kiosk Escape with a Twist 

Spectrum Power 4 provides users with a SCADA client to interact with grid management applications on the server. Like other SCADA systems, it uses X11 for graphical renderingbut critically, these sessions render serverside rather than on the client.

From the SCADA user interface, operators can launch various helper applications such as PDF viewers or editors. Some of these applications provide functionality to browse the local filesystem or spawn external programs. An attacker abusing this can escape the intended application boundary – for instance, opening a file browser dialog, navigating to a terminal emulator, or leveraging an application like gvim – to execute shell commands. 

The key issue: because of the serverside X11 architecture, this shell access lands directly on the Spectrum Power server itself, not on the user’s client machine. 

From this initial foothold, an attacker can chain the local privilege escalation vulnerabilities (CVE202432008, CVE202432009, or CVE202432010) to achieve full administrative control of the server. Given the interconnected nature of Spectrum Power deployments, this can enable lateral movement across the entire grid management infrastructure. 

About Spectrum Power 4

Spectrum Power is Siemens’ grid management platform providing SCADA, energy management, and distribution management capabilities. According to Siemens, it is “the globally leading power grid management software system”. The current generation, Spectrum Power 7, is deployed in over 1,300 control centers across 90 countries. 

CISA classifies Spectrum Power deployments within critical infrastructure sectors including Energy, Chemical, Critical Manufacturing, Food and Agriculture, and Water and Wastewater Systems (ICSA-19-099-02).

Legacy, but still in production

Spectrum Power 4 is the predecessor to the current Spectrum Power 7 product line. While Siemens actively markets SP7 for new deployments – including a recent major contract with DB Energie for the German railway grid – many SP4 installations remain in production worldwide. 

This is typical for critical infrastructure. SCADA and EMS upgrades are complex multi-year projects involving: 

  • 24/7 availability requirements – grids cannot go offline for migrations 
  • Regulatory requirements– new systems require extensive validation 
  • Integration dependencies – connections to RTUs, historians, market systems, and third-party tools 
  • Budget cycles – capital expenditure for control system upgrades competes with other grid investments 

The result is a long tail of legacy systems running in production, often for a decade or more beyond their intended lifecycle. Security research on these systems remains criticaloperators need vulnerability information and patches regardless of whether the product is still actively sold. 

This discovery highlights why regular security assessments of SCADA and EMS products remain essential. 

Your security is our mission. Let’s defend what matters!