Siemens SICAM A8000 - Multiple Vulnerabilities Discovered

CyberDanube has revealed serious vulnerabilities in Siemens SICAM A8000 devices. These flaws could allow denial of service and remote code execution. Users must upgrade to the latest version immediately to safeguard their systems.

VulnerabilitiesHIGHUpdated: Published:
Featured image for Siemens SICAM A8000 - Multiple Vulnerabilities Discovered

Original Reporting

FDFull Disclosure

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, there are serious security holes in Siemens devices that could let hackers take control.

What Happened

CyberDanube Security Research has uncovered multiple vulnerabilities in the Siemens SICAM A8000 series, specifically affecting the CP-8050, CP-8031, CP-8010, and CP-8012 master modules. The vulnerabilities, discovered during a penetration test, include an unauthenticated denial of service and a memory corruption issue that could allow remote code execution.

The Flaw

  1. Unauthenticated Denial of Service: A crafted POST request with an oversized Content-Length can force the service to wait indefinitely for more data, blocking all other user interactions.
  2. Unauthenticated Memory Corruption (CVE-2026-27664): Sending a malicious XML payload can write null bytes to arbitrary memory locations, potentially leading to denial of service or remote code execution.

What's at Risk

The vulnerabilities primarily affect the IHI00.elf and RTUM85.elf binaries. If exploited, these vulnerabilities can disrupt the functionality of the SICAM A8000 devices, posing significant risks to operational technology environments.

Patch Status

Siemens has released a fixed version (V26.10) that addresses these vulnerabilities. Users are strongly advised to upgrade their systems to this version to mitigate the risks.

Immediate Actions

Containment

  • 1.Upgrade to the latest version (V26.10) as soon as possible.
  • 2.Restrict network access to the affected devices to limit exposure.

Conclusion

The discovery of these vulnerabilities highlights the need for ongoing vigilance in securing industrial control systems. Organizations using Siemens SICAM A8000 devices must act quickly to protect their infrastructure from potential attacks.

🔒 Pro Insight

🔒 Pro insight: The memory corruption vulnerability could be exploited to gain control over critical infrastructure, emphasizing the need for immediate patching.

FDFull Disclosure
Read Original

Related Pings