Siemens SICAM Q100 Devices
The SICAM Q100 power meter web server (versions before V2.60) contains a Cross-Site Request Forgery (CSRF) vulnerability and lacks proper cookie protection flags. This allows an attacker to perform arbitrary actions on the device on behalf of a legitimate logged-in user, potentially altering meter settings, reading data, or resetting configuration without the user's knowledge. The vulnerability requires the user to visit a malicious website while maintaining an active session with the SICAM Q100 web interface.
- User with administrative or management access to SICAM Q100 web interface must be logged in
- That user must visit or click a link to a website controlled by the attacker
- Web browser must have cookies enabled
- SICAM Q100 must be reachable from the network where the user is accessing the attacker's website
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f273bc41-e951-47fa-855a-91b9b124beb8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.