Siemens SICAM A8000
Siemens SICAM A8000 substation automation devices contain two vulnerabilities. The first allows a privileged user to enable a debug port that uses default hard-coded credentials (CWE-798: hardcoded credentials). The second allows unauthenticated users to access previously created log files on the device without authentication (CWE-284: improper access control). These issues affect CP-8000, CP-8021, and CP-8022 master modules running firmware versions prior to 16.20. An attacker exploiting these vulnerabilities could gain unauthorized access to the device, retrieve sensitive operational data, or establish persistent access to the substation automation system.
- Network access to the SICAM A8000 device on its management port
- Valid engineering workstation credentials for the first vulnerability
- No credentials required for the second vulnerability (unauthenticated log file access)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/837b69aa-53f6-4bda-aa39-88d4cb58646eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.