Siemens SICAM
Multiple critical vulnerabilities in Siemens SICAM RTU SM-2556 COM Modules with firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00 allow remote code execution without authentication. The vulnerabilities stem from CWE-306 (missing authentication), CWE-79 (cross-site scripting), and CWE-94 (improper control of generation of code). The web server interface built into these modules is exploitable remotely with low skill level, and public exploits are available. The affected firmware versions have reached end-of-life and no patches will be released for these versions.
- Network reachability to the web server port on the SM-2556 COM Module
- No authentication or credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ee26d40e-73ac-4673-a8ac-b0efae76e93aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.