Siemens SICAM P850 family and SICAM P855 family
Two vulnerabilities in Siemens SICAM P850 and P855 power distribution and substation automation controllers: CVE-2023-30901 (Cross-Site Request Forgery) and CVE-2023-31238 (authentication/access control bypass on port 443). Both allow an attacker to perform actions as an authenticated user or impersonate that user if the attacker can trick a logged-in user into clicking a malicious link or if the attacker gains network access to the HTTPS management port. The vulnerabilities affect all versions before firmware 3.11. No patch has been released by Siemens; these products are end-of-life.
- Valid credentials for a legitimate user (or ability to harvest them)
- User must be actively logged in to the SICAM device web interface
- Network access to port 443/tcp (HTTPS)
- For CVE-2023-30901: User must click a malicious link while logged in; for CVE-2023-31238: direct network reach to the device port
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b0c6fdf7-cb8a-47bc-9cbe-dd7314903e5fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.