Siemens CPCI85 Central Processing/Communication
MonitorCVSS 4.6ICS-CERT ICSA-24-347-01Dec 10, 2024
Siemens
Attack path
Attack VectorPhysical
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
The SICAM A8000 CP-8031 and CP-8050 devices (CPCI85 Central Processing/Communication) are affected by a firmware decryption vulnerability. An attacker with physical access to the device could decrypt the firmware. Siemens has released new firmware and hardware versions to address this issue. Both firmware and hardware updates are required to fully resolve the vulnerability.
What this means
What could happen
An attacker with physical access could decrypt and potentially reverse-engineer or modify the device firmware, gaining the ability to alter industrial control logic or compromise the device's trusted operation. This threatens the integrity and reliability of critical substation or power system operations.
Who's at risk
Operators of electrical substations, control centers, or remote terminal units using Siemens SICAM A8000 CP-8031 or CP-8050 central processing/communication units should prioritize this issue. The risk is greatest where these devices are accessible to unauthorized personnel or located in areas with inadequate physical security controls.
How it could be exploited
An attacker must have physical access to the CPCI85 device. Once they have direct access, they can decrypt the firmware without requiring authentication, potentially extracting sensitive control logic or injecting malicious firmware to alter device behavior or disable protection mechanisms.
Prerequisites
- Physical access to the CPCI85 device
- No authentication or credentials required
affects industrial control systemsrequires physical access (not remotely exploitable)no authentication needed once physical access gainedfirmware decryption enables potential unauthorized modifications
Exploitability
Unlikely to be exploited — EPSS score 0.2%
Affected products (1)
ProductAffected VersionsFix Status
CPCI85 Central Processing/Communication<V05.3005.30
Remediation & Mitigation
0/4
Do now
0/1HARDENINGRestrict physical access to CPCI85 devices with locked enclosures, access controls, or security seals
Schedule — requires maintenance window
0/2Patching may require device reboot — plan for process interruption
HOTFIXUpdate CPCI85 Central Processing/Communication to firmware version 05.30 or later
HOTFIXReplace hardware with updated version available from Siemens (firmware update alone is insufficient)
Long-term hardening
0/1HARDENINGLocate control system networks and CPCI85 devices behind firewalls and isolate them from business networks
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/d26abf10-6fc8-4f67-8a5e-4dc49353c9eeGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.