Siemens SICAM A8000 Devices
The CPCI85 firmware of Siemens SICAM A8000 CP-8031 and CP-8050 master modules contains multiple vulnerabilities: (1) authenticated remote command injection allowing arbitrary code execution on the device, (2) exposure of the serial UART debug interface accessible from the network, and (3) hardcoded credentials for UART login. These master modules are used for grid-level protection and monitoring in electrical substations and control centers. Exploitation could allow an attacker to manipulate grid control parameters, interfere with protection logic, or disable critical monitoring functions.
- Valid engineering credentials for the SICAM A8000 management interface (for authenticated remote command injection)
- Network connectivity to the management port of the CP-8031 or CP-8050 master module
- Physical access to the UART debug port OR network path to the exposed UART interface for the hardcoded credential attack
Patching may require device reboot — plan for process interruption
/api/v1/advisories/03ebd566-ae9b-4cc3-9a56-f133d16c553fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.