Affected devices use a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that obtains a configuration backup to extract configuration information from the exported file.
https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-12
https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-08
https://cert-portal.siemens.com/productcert/pdf/ssa-699386.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf
https://cert-portal.siemens.com/productcert/html/ssa-690517.html
https://cert-portal.siemens.com/productcert/html/ssa-353002.html
https://cert-portal.siemens.com/productcert/html/ssa-180704.html