CVE-2020-10037

7.5 HIGH

📋 TL;DR

A memory read vulnerability in Siemens SICAM devices allows attackers to perform flooding attacks against the web server, potentially exposing confidential information from device memory. This affects SICAM MMU versions before V2.05, SICAM SGU all versions, and SICAM T versions before V2.18, used in industrial control systems.

💻 Affected Systems

Products:
  • SICAM MMU
  • SICAM SGU
  • SICAM T
Versions: SICAM MMU: all versions < V2.05; SICAM SGU: all versions; SICAM T: all versions < V2.18
Operating Systems: Not specified, likely embedded OS
Default Config Vulnerable: ⚠️ Yes
Notes: Devices are typically deployed in industrial environments; default configurations may expose web interfaces.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized read access to sensitive device memory, potentially exposing credentials, configuration data, or operational secrets, leading to further compromise of industrial networks.

🟠

Likely Case

Attackers exploit the vulnerability to extract limited memory data, such as session information or partial configuration details, which could aid in reconnaissance or targeted attacks.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is minimized to isolated systems, preventing data exfiltration and limiting attacker reach.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires flooding the web server, which may involve network-level attacks; no public proof-of-concept has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SICAM MMU: V2.05 or later; SICAM T: V2.18 or later; SICAM SGU: check vendor for updates as all versions are affected

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-305120.pdf

Restart Required: Yes

Instructions:

1. Download the patch from Siemens support portal. 2. Apply the update following vendor instructions. 3. Restart the device to activate changes. 4. Verify the version is updated.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks to limit attack surface.

Access Control Lists

linux

Restrict web server access to trusted IP addresses only.

iptables -A INPUT -p tcp --dport 80 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices from external and internal threats.
  • Monitor network traffic for unusual flooding patterns and set up alerts for potential exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check device version via web interface or CLI; if SICAM MMU < V2.05, SICAM SGU any version, or SICAM T < V2.18, it is vulnerable.

Check Version:

Consult device documentation or web interface for version information; no standard command provided.

Verify Fix Applied:

After patching, confirm the version is updated to SICAM MMU V2.05+, SICAM T V2.18+, or check vendor for SGU updates.

📡 Detection & Monitoring

Log Indicators:

  • Unusual high-volume requests to web server logs
  • Memory access errors or anomalies in system logs

Network Indicators:

  • Spike in HTTP traffic to device web ports
  • Flooding patterns from untrusted sources

SIEM Query:

source_ip:* AND dest_port:80 AND bytes_out > threshold OR event_count > normal_baseline

🔗 References

📤 Share & Export