Siemens SICAM A8000
Monitor5.3ICS-CERT ICSA-22-104-10Apr 12, 2022
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
SICAM A8000 CP-8031 and CP-8050 devices contain an unauthenticated file access vulnerability. An attacker on the network can read files from the device without providing credentials. Affected versions: CP-8031 and CP-8050 firmware below version 4.80. Siemens has released firmware version 4.80 and later to correct this issue.
What this means
What could happen
An attacker could read files from the SICAM A8000 gateway device without providing credentials, potentially exposing sensitive operational or configuration data used to manage the power or water distribution network.
Who's at risk
Water and electric utilities operating SICAM A8000 gateway devices (CP-8031 or CP-8050 models) for SCADA data management or remote terminal unit (RTU) communication. Any facility using these devices for supervisory control and monitoring of distribution systems should apply this update.
How it could be exploited
An attacker with network access to the SICAM A8000 CP-8031 or CP-8050 device (typically on port 80 or 443) can send requests to access files without authentication. The device responds by returning file contents, allowing the attacker to enumerate configuration, network topology, or other sensitive data stored on the gateway.
Prerequisites
- Network access to the SICAM A8000 device (typically on management/web interface ports)
- Device running firmware version below 4.80
- No additional authentication or credentials required
remotely exploitableno authentication requiredlow complexityaffects industrial gateway device
Exploitability
Low exploit probability (EPSS 0.4%)
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
SICAM A8000 CP-8031<V4.804.80
SICAM A8000 CP-8050<V4.804.80
Remediation & Mitigation
0/4
Do now
0/1WORKAROUNDRestrict network access to SICAM A8000 devices using firewall rules; only allow access from authorized engineering workstations and management networks
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
SICAM A8000 CP-8031
HOTFIXUpdate SICAM A8000 CP-8031 and CP-8050 devices to firmware version 4.80 or later
Long-term hardening
0/2HARDENINGPlace SICAM A8000 devices behind a firewall and isolate from the business network and Internet
HARDENINGIf remote access is required, use a VPN with up-to-date security patches
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/e819a383-79bb-4fb5-bac2-88d92ce910c8