CVE-2022-29872

8.8 HIGH

📋 TL;DR

This vulnerability in SICAM T devices allows authenticated attackers to send malicious POST requests that bypass parameter validation. Attackers can cause denial of service or execute arbitrary code by manipulating the program counter. All SICAM T devices running versions before V3.0 are affected.

💻 Affected Systems

Products:
  • SICAM T
Versions: All versions < V3.0
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: All SICAM T devices with affected firmware versions are vulnerable by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing remote code execution, potential lateral movement within industrial control networks, and manipulation of critical infrastructure operations.

🟠

Likely Case

Denial of service attacks disrupting device functionality, potentially affecting industrial processes and monitoring capabilities.

🟢

If Mitigated

Limited impact if proper network segmentation, authentication controls, and monitoring are in place to detect anomalous POST requests.

🌐 Internet-Facing: HIGH - If devices are exposed to the internet, attackers could exploit this vulnerability remotely after obtaining credentials.
🏢 Internal Only: MEDIUM - Requires authenticated access, but internal attackers or compromised accounts could exploit this to disrupt operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the device web interface. Exploitation involves crafting malicious POST requests with invalid parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.0 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-165073.html

Restart Required: Yes

Instructions:

1. Download SICAM T firmware version V3.0 or later from Siemens support portal. 2. Backup device configuration. 3. Apply firmware update following Siemens documentation. 4. Restart device. 5. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate SICAM T devices in separate network segments with strict access controls

Access Restriction

all

Implement strict authentication controls and limit access to authorized personnel only

🧯 If You Can't Patch

  • Implement network-based intrusion detection to monitor for anomalous POST requests to SICAM T devices
  • Enforce strong authentication mechanisms and regularly audit user accounts with device access

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI. If version is below V3.0, device is vulnerable.

Check Version:

Check via device web interface or refer to Siemens documentation for CLI commands specific to your SICAM T model.

Verify Fix Applied:

Verify firmware version is V3.0 or higher after applying update. Test POST request handling with invalid parameters.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by POST requests with unusual parameters
  • Device logs showing unexpected program counter changes or crash events

Network Indicators:

  • Unusual POST request patterns to SICAM T web interface
  • Traffic from unexpected sources to device management ports

SIEM Query:

source_ip=* AND dest_ip=SICAM_T_IP AND (http_method=POST AND (http_uri CONTAINS "/config" OR http_uri CONTAINS "/control") AND http_status=200 AND byte_count>threshold)

🔗 References

📤 Share & Export