A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device.

Project Subscriptions

Vendors Products
Siemens Subscribe
7kg8500-0aa00-0aa0 Subscribe
7kg8500-0aa00-0aa0 Firmware Subscribe
7kg8500-0aa00-2aa0 Subscribe
7kg8500-0aa00-2aa0 Firmware Subscribe
7kg8500-0aa10-0aa0 Subscribe
7kg8500-0aa10-0aa0 Firmware Subscribe
7kg8500-0aa10-2aa0 Subscribe
7kg8500-0aa10-2aa0 Firmware Subscribe
7kg8500-0aa30-0aa0 Subscribe
7kg8500-0aa30-0aa0 Firmware Subscribe
7kg8500-0aa30-2aa0 Subscribe
7kg8500-0aa30-2aa0 Firmware Subscribe
7kg8501-0aa01-0aa0 Subscribe
7kg8501-0aa01-0aa0 Firmware Subscribe
7kg8501-0aa01-2aa0 Subscribe
7kg8501-0aa01-2aa0 Firmware Subscribe
7kg8501-0aa02-0aa0 Subscribe
7kg8501-0aa02-0aa0 Firmware Subscribe
7kg8501-0aa02-2aa0 Subscribe
7kg8501-0aa02-2aa0 Firmware Subscribe
7kg8501-0aa11-0aa0 Subscribe
7kg8501-0aa11-0aa0 Firmware Subscribe
7kg8501-0aa11-2aa0 Subscribe
7kg8501-0aa11-2aa0 Firmware Subscribe
7kg8501-0aa12-0aa0 Subscribe
7kg8501-0aa12-0aa0 Firmware Subscribe
7kg8501-0aa12-2aa0 Subscribe
7kg8501-0aa12-2aa0 Firmware Subscribe
7kg8501-0aa31-0aa0 Subscribe
7kg8501-0aa31-0aa0 Firmware Subscribe
7kg8501-0aa31-2aa0 Subscribe
7kg8501-0aa31-2aa0 Firmware Subscribe
7kg8501-0aa32-0aa0 Subscribe
7kg8501-0aa32-0aa0 Firmware Subscribe
7kg8501-0aa32-2aa0 Subscribe
7kg8501-0aa32-2aa0 Firmware Subscribe
7kg8550-0aa00-0aa0 Subscribe
7kg8550-0aa00-0aa0 Firmware Subscribe
7kg8550-0aa00-2aa0 Subscribe
7kg8550-0aa00-2aa0 Firmware Subscribe
7kg8550-0aa10-0aa0 Subscribe
7kg8550-0aa10-0aa0 Firmware Subscribe
7kg8550-0aa10-2aa0 Subscribe
7kg8550-0aa10-2aa0 Firmware Subscribe
7kg8550-0aa30-0aa0 Subscribe
7kg8550-0aa30-0aa0 Firmware Subscribe
7kg8550-0aa30-2aa0 Subscribe
7kg8550-0aa30-2aa0 Firmware Subscribe
7kg8551-0aa01-0aa0 Subscribe
7kg8551-0aa01-0aa0 Firmware Subscribe
7kg8551-0aa01-2aa0 Subscribe
7kg8551-0aa01-2aa0 Firmware Subscribe
7kg8551-0aa02-0aa0 Subscribe
7kg8551-0aa02-0aa0 Firmware Subscribe
7kg8551-0aa02-2aa0 Subscribe
7kg8551-0aa02-2aa0 Firmware Subscribe
7kg8551-0aa11-0aa0 Subscribe
7kg8551-0aa11-0aa0 Firmware Subscribe
7kg8551-0aa11-2aa0 Subscribe
7kg8551-0aa11-2aa0 Firmware Subscribe
7kg8551-0aa12-0aa0 Subscribe
7kg8551-0aa12-0aa0 Firmware Subscribe
7kg8551-0aa12-2aa0 Subscribe
7kg8551-0aa12-2aa0 Firmware Subscribe
7kg8551-0aa31-0aa0 Subscribe
7kg8551-0aa31-0aa0 Firmware Subscribe
7kg8551-0aa31-2aa0 Subscribe
7kg8551-0aa31-2aa0 Firmware Subscribe
7kg8551-0aa32-0aa0 Subscribe
7kg8551-0aa32-0aa0 Firmware Subscribe
7kg8551-0aa32-2aa0 Subscribe
7kg8551-0aa32-2aa0 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-34185 A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 09 Dec 2025 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device. A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices do not properly validate parameters of certain GET and POST requests. This could allow an unauthenticated attacker to set the device to a denial of service state or to control the program counter and, thus, execute arbitrary code on the device.
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-12-09T10:33:57.754Z

Reserved: 2022-04-28T00:00:00

Link: CVE-2022-29873

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-20T13:15:15.977

Modified: 2025-12-09T16:17:13.147

Link: CVE-2022-29873

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses