Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3
Monitor6.3SSA-225578Jul 12, 2022
Attack VectorNetwork
Auth RequiredLow
ComplexityLow
User InteractionNone needed
Summary
SICAM GridEdge contains an improper access control vulnerability in file permissions that could allow persons with local access to the host system to inject an SSH key, potentially gaining unauthorized remote access. The vulnerability affects versions before 2.7.3.
What this means
What could happen
An attacker with local access to the GridEdge host system could inject an SSH key and gain persistent remote access to the device, potentially allowing them to reconfigure grid edge functions or disrupt communications with the control center.
Who's at risk
Energy sector utilities operating SICAM GridEdge devices (Classic version) before 2.7.3 in grid edge or distribution automation roles. This affects any organization using GridEdge for substation or distribution-level SCADA communications and control functions.
How it could be exploited
An attacker must first gain local command-line access to the GridEdge host system (via physical access, compromised local account, or other local privilege). Once local, they can exploit improper file permissions on SSH configuration directories to inject an unauthorized SSH public key. This allows them to connect remotely via SSH without requiring the legitimate system credentials.
Prerequisites
- Local access to the GridEdge host system (physical access, local user account, or local code execution)
- Ability to write to SSH configuration directories on the host
Local access requiredAuthentication bypass potentialPersistence capability (SSH key injection)Medium severity
Exploitability
Low exploit probability (EPSS 0.2%)
Affected products (1)
ProductAffected VersionsFix Status
SICAM GridEdge (Classic)< 2.7.32.7.3
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate SICAM GridEdge (Classic) to version 2.7.3 or later
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/b62b6f85-98ae-4532-9ac3-84bab2c08e23