A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Siemens
Subscribe
|
7kg8500-0aa00-0aa0
Subscribe
7kg8500-0aa00-0aa0 Firmware
Subscribe
7kg8500-0aa00-2aa0
Subscribe
7kg8500-0aa00-2aa0 Firmware
Subscribe
7kg8500-0aa10-0aa0
Subscribe
7kg8500-0aa10-0aa0 Firmware
Subscribe
7kg8500-0aa10-2aa0
Subscribe
7kg8500-0aa10-2aa0 Firmware
Subscribe
7kg8500-0aa30-0aa0
Subscribe
7kg8500-0aa30-0aa0 Firmware
Subscribe
7kg8500-0aa30-2aa0
Subscribe
7kg8500-0aa30-2aa0 Firmware
Subscribe
7kg8501-0aa01-0aa0
Subscribe
7kg8501-0aa01-0aa0 Firmware
Subscribe
7kg8501-0aa01-2aa0
Subscribe
7kg8501-0aa01-2aa0 Firmware
Subscribe
7kg8501-0aa02-0aa0
Subscribe
7kg8501-0aa02-0aa0 Firmware
Subscribe
7kg8501-0aa02-2aa0
Subscribe
7kg8501-0aa02-2aa0 Firmware
Subscribe
7kg8501-0aa11-0aa0
Subscribe
7kg8501-0aa11-0aa0 Firmware
Subscribe
7kg8501-0aa11-2aa0
Subscribe
7kg8501-0aa11-2aa0 Firmware
Subscribe
7kg8501-0aa12-0aa0
Subscribe
7kg8501-0aa12-0aa0 Firmware
Subscribe
7kg8501-0aa12-2aa0
Subscribe
7kg8501-0aa12-2aa0 Firmware
Subscribe
7kg8501-0aa31-0aa0
Subscribe
7kg8501-0aa31-0aa0 Firmware
Subscribe
7kg8501-0aa31-2aa0
Subscribe
7kg8501-0aa31-2aa0 Firmware
Subscribe
7kg8501-0aa32-0aa0
Subscribe
7kg8501-0aa32-0aa0 Firmware
Subscribe
7kg8501-0aa32-2aa0
Subscribe
7kg8501-0aa32-2aa0 Firmware
Subscribe
7kg8550-0aa00-0aa0
Subscribe
7kg8550-0aa00-0aa0 Firmware
Subscribe
7kg8550-0aa00-2aa0
Subscribe
7kg8550-0aa00-2aa0 Firmware
Subscribe
7kg8550-0aa10-0aa0
Subscribe
7kg8550-0aa10-0aa0 Firmware
Subscribe
7kg8550-0aa10-2aa0
Subscribe
7kg8550-0aa10-2aa0 Firmware
Subscribe
7kg8550-0aa30-0aa0
Subscribe
7kg8550-0aa30-0aa0 Firmware
Subscribe
7kg8550-0aa30-2aa0
Subscribe
7kg8550-0aa30-2aa0 Firmware
Subscribe
7kg8551-0aa01-0aa0
Subscribe
7kg8551-0aa01-0aa0 Firmware
Subscribe
7kg8551-0aa01-2aa0
Subscribe
7kg8551-0aa01-2aa0 Firmware
Subscribe
7kg8551-0aa02-0aa0
Subscribe
7kg8551-0aa02-0aa0 Firmware
Subscribe
7kg8551-0aa02-2aa0
Subscribe
7kg8551-0aa02-2aa0 Firmware
Subscribe
7kg8551-0aa11-0aa0
Subscribe
7kg8551-0aa11-0aa0 Firmware
Subscribe
7kg8551-0aa11-2aa0
Subscribe
7kg8551-0aa11-2aa0 Firmware
Subscribe
7kg8551-0aa12-0aa0
Subscribe
7kg8551-0aa12-0aa0 Firmware
Subscribe
7kg8551-0aa12-2aa0
Subscribe
7kg8551-0aa12-2aa0 Firmware
Subscribe
7kg8551-0aa31-0aa0
Subscribe
7kg8551-0aa31-0aa0 Firmware
Subscribe
7kg8551-0aa31-2aa0
Subscribe
7kg8551-0aa31-2aa0 Firmware
Subscribe
7kg8551-0aa32-0aa0
Subscribe
7kg8551-0aa32-0aa0 Firmware
Subscribe
7kg8551-0aa32-2aa0
Subscribe
7kg8551-0aa32-2aa0 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-34190 | A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 09 Dec 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device. | A vulnerability has been identified in SICAM T (All versions < V3.0). Affected devices use a limited range for challenges that are sent during the unencrypted challenge-response communication. An unauthenticated attacker could capture a valid challenge-response pair generated by a legitimate user, and request the webpage repeatedly to wait for the same challenge to reappear for which the correct response is known. This could allow the attacker to access the management interface of the device. |
| References |
| |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-12-09T10:37:46.480Z
Reserved: 2022-04-28T00:00:00
Link: CVE-2022-29878
No data.
Status : Modified
Published: 2022-05-20T13:15:16.177
Modified: 2025-12-09T16:17:13.790
Link: CVE-2022-29878
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD