Changeflow GovPing Data Privacy & Cybersecurity Siemens SICAM Vulnerabilities Allow Denial of S...
Priority review Notice Amended Final

Siemens SICAM Vulnerabilities Allow Denial of Service Attacks

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund has issued a security advisory regarding multiple vulnerabilities in Siemens SICAM SCADA systems. These vulnerabilities, with a CVSS base score of 7.5, can be exploited by attackers to perform Denial of Service attacks. Affected products include Siemens SICAM CPCI85, RTUM85, and SICORE with versions prior to specific updates.

Published by CERT-Bund on wid.cert-bund.de . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

What changed

CERT-Bund has released a security advisory (WID-SEC-2026-0889) detailing multiple vulnerabilities in Siemens SICAM SCADA systems, which can be exploited to conduct Denial of Service (DoS) attacks. The advisory assigns a CVSS base score of 7.5 (High) and a temporal score of 6.5 (Medium), indicating a significant security risk. Affected products include Siemens SICAM CPCI85, RTUM85, and SICORE, specifically versions prior to 26.10, 26.10, and 26.10.0, respectively. The advisory notes that remote attacks are possible.

Organizations utilizing the affected Siemens SICAM systems should immediately review their configurations and apply available mitigations or updates to prevent potential DoS attacks. Given the critical nature of SCADA systems in industrial processes, a failure to address these vulnerabilities could lead to significant operational disruptions. While a specific compliance deadline is not provided, prompt action is recommended to secure these systems and maintain operational continuity.

What to do next

  1. Review Siemens SICAM system versions for applicability.
  2. Apply available mitigations or updates provided by Siemens.
  3. Assess potential impact of DoS attacks on operational continuity.

Archived snapshot

Mar 28, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-0889] Siemens SICAM: Mehrere Schwachstellen ermöglichen Denial of Service CVSS Base Score 7.5 (hoch) CVSS Temporal Score 6.5 (mittel) Remoteangriff ja Datum 26.03.2026 Stand 27.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Sonstiges

Produktbeschreibung

Siemens SICAM ist eine Produktfamilie von SCADA-Systemen für den Betrieb von industriellen Prozessen.

Produkte

26.03.2026
- Siemens SICAM CPCI85 <26.10

  • Siemens SICAM RTUM85 <26.10

  • Siemens SICAM SICORE <26.10.0

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in Siemens SICAM ausnutzen, um einen Denial of Service Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
March 26th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0889

Who this affects

Applies to
Energy companies
Industry sector
2210 Electric Utilities
Activity scope
Industrial Control Systems Security Denial of Service Prevention
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Industrial Control Systems Denial of Service

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!