Siemens SICAM MMU, SICAM T, and SICAM SGU
Multiple vulnerabilities in Siemens SICAM substation automation devices allow unauthenticated remote code execution and firmware installation. The affected products include SICAM MMU (Remote Terminal Unit), SICAM T (Terminal), and SICAM SGU (Substation Gateway Unit). Vulnerabilities include buffer overflows (CWE-120, CWE-125), missing authentication (CWE-306), unencrypted communication (CWE-311), improper input validation (CWE-79, CWE-80), and missing cryptographic controls (CWE-294, CWE-916). An unauthenticated attacker with network access can execute arbitrary commands on the device, install malicious firmware, and intercept sensitive data. The devices transmit passwords and commands in plaintext; hardware constraints prevent on-device encryption.
- Network access to the device's HTTP port (unencrypted web interface)
- No valid credentials required
- Device must be running vulnerable firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0b446802-5953-4090-a6d8-7921215a5c2eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.