Siemens SICAM MMU, SICAM T, and SICAM SGU
Multiple vulnerabilities in Siemens SICAM substation automation devices allow unauthenticated remote code execution and firmware installation. The affected products include SICAM MMU (Remote Terminal Unit), SICAM T (Terminal), and SICAM SGU (Substation Gateway Unit). Vulnerabilities include buffer overflows (CWE-120, CWE-125), missing authentication (CWE-306), unencrypted communication (CWE-311), improper input validation (CWE-79, CWE-80), and missing cryptographic controls (CWE-294, CWE-916). An unauthenticated attacker with network access can execute arbitrary commands on the device, install malicious firmware, and intercept sensitive data. The devices transmit passwords and commands in plaintext; hardware constraints prevent on-device encryption.
- Network access to the device's HTTP port (unencrypted web interface)
- No valid credentials required
- Device must be running vulnerable firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0b446802-5953-4090-a6d8-7921215a5c2e