A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device.

Project Subscriptions

Vendors Products
Siemens Subscribe
7kg8500-0aa00-0aa0 Subscribe
7kg8500-0aa00-0aa0 Firmware Subscribe
7kg8500-0aa00-2aa0 Subscribe
7kg8500-0aa00-2aa0 Firmware Subscribe
7kg8500-0aa10-0aa0 Subscribe
7kg8500-0aa10-0aa0 Firmware Subscribe
7kg8500-0aa10-2aa0 Subscribe
7kg8500-0aa10-2aa0 Firmware Subscribe
7kg8500-0aa30-0aa0 Subscribe
7kg8500-0aa30-0aa0 Firmware Subscribe
7kg8500-0aa30-2aa0 Subscribe
7kg8500-0aa30-2aa0 Firmware Subscribe
7kg8501-0aa01-0aa0 Subscribe
7kg8501-0aa01-0aa0 Firmware Subscribe
7kg8501-0aa01-2aa0 Subscribe
7kg8501-0aa01-2aa0 Firmware Subscribe
7kg8501-0aa02-0aa0 Subscribe
7kg8501-0aa02-0aa0 Firmware Subscribe
7kg8501-0aa02-2aa0 Subscribe
7kg8501-0aa02-2aa0 Firmware Subscribe
7kg8501-0aa11-0aa0 Subscribe
7kg8501-0aa11-0aa0 Firmware Subscribe
7kg8501-0aa11-2aa0 Subscribe
7kg8501-0aa11-2aa0 Firmware Subscribe
7kg8501-0aa12-0aa0 Subscribe
7kg8501-0aa12-0aa0 Firmware Subscribe
7kg8501-0aa12-2aa0 Subscribe
7kg8501-0aa12-2aa0 Firmware Subscribe
7kg8501-0aa31-0aa0 Subscribe
7kg8501-0aa31-0aa0 Firmware Subscribe
7kg8501-0aa31-2aa0 Subscribe
7kg8501-0aa31-2aa0 Firmware Subscribe
7kg8501-0aa32-0aa0 Subscribe
7kg8501-0aa32-0aa0 Firmware Subscribe
7kg8501-0aa32-2aa0 Subscribe
7kg8501-0aa32-2aa0 Firmware Subscribe
7kg8550-0aa00-0aa0 Subscribe
7kg8550-0aa00-0aa0 Firmware Subscribe
7kg8550-0aa00-2aa0 Subscribe
7kg8550-0aa00-2aa0 Firmware Subscribe
7kg8550-0aa10-0aa0 Subscribe
7kg8550-0aa10-0aa0 Firmware Subscribe
7kg8550-0aa10-2aa0 Subscribe
7kg8550-0aa10-2aa0 Firmware Subscribe
7kg8550-0aa30-0aa0 Subscribe
7kg8550-0aa30-0aa0 Firmware Subscribe
7kg8550-0aa30-2aa0 Subscribe
7kg8550-0aa30-2aa0 Firmware Subscribe
7kg8551-0aa01-0aa0 Subscribe
7kg8551-0aa01-0aa0 Firmware Subscribe
7kg8551-0aa01-2aa0 Subscribe
7kg8551-0aa01-2aa0 Firmware Subscribe
7kg8551-0aa02-0aa0 Subscribe
7kg8551-0aa02-0aa0 Firmware Subscribe
7kg8551-0aa02-2aa0 Subscribe
7kg8551-0aa02-2aa0 Firmware Subscribe
7kg8551-0aa11-0aa0 Subscribe
7kg8551-0aa11-0aa0 Firmware Subscribe
7kg8551-0aa11-2aa0 Subscribe
7kg8551-0aa11-2aa0 Firmware Subscribe
7kg8551-0aa12-0aa0 Subscribe
7kg8551-0aa12-0aa0 Firmware Subscribe
7kg8551-0aa12-2aa0 Subscribe
7kg8551-0aa12-2aa0 Firmware Subscribe
7kg8551-0aa31-0aa0 Subscribe
7kg8551-0aa31-0aa0 Firmware Subscribe
7kg8551-0aa31-2aa0 Subscribe
7kg8551-0aa31-2aa0 Firmware Subscribe
7kg8551-0aa32-0aa0 Subscribe
7kg8551-0aa32-0aa0 Firmware Subscribe
7kg8551-0aa32-2aa0 Subscribe
7kg8551-0aa32-2aa0 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-34186 A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 09 Dec 2025 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device. A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices do not encrypt web traffic with clients but communicate in cleartext via HTTP. This could allow an unauthenticated attacker to capture the traffic and interfere with the functionality of the device.
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-12-09T10:35:13.930Z

Reserved: 2022-04-28T00:00:00

Link: CVE-2022-29874

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-20T13:15:16.030

Modified: 2025-12-09T16:17:13.360

Link: CVE-2022-29874

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses