A vulnerability has been identified in SICAM T (All versions < V3.0). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow authenticated users to access critical device information.

Project Subscriptions

Vendors Products
Siemens Subscribe
7kg8500-0aa00-0aa0 Subscribe
7kg8500-0aa00-0aa0 Firmware Subscribe
7kg8500-0aa00-2aa0 Subscribe
7kg8500-0aa00-2aa0 Firmware Subscribe
7kg8500-0aa10-0aa0 Subscribe
7kg8500-0aa10-0aa0 Firmware Subscribe
7kg8500-0aa10-2aa0 Subscribe
7kg8500-0aa10-2aa0 Firmware Subscribe
7kg8500-0aa30-0aa0 Subscribe
7kg8500-0aa30-0aa0 Firmware Subscribe
7kg8500-0aa30-2aa0 Subscribe
7kg8500-0aa30-2aa0 Firmware Subscribe
7kg8501-0aa01-0aa0 Subscribe
7kg8501-0aa01-0aa0 Firmware Subscribe
7kg8501-0aa01-2aa0 Subscribe
7kg8501-0aa01-2aa0 Firmware Subscribe
7kg8501-0aa02-0aa0 Subscribe
7kg8501-0aa02-0aa0 Firmware Subscribe
7kg8501-0aa02-2aa0 Subscribe
7kg8501-0aa02-2aa0 Firmware Subscribe
7kg8501-0aa11-0aa0 Subscribe
7kg8501-0aa11-0aa0 Firmware Subscribe
7kg8501-0aa11-2aa0 Subscribe
7kg8501-0aa11-2aa0 Firmware Subscribe
7kg8501-0aa12-0aa0 Subscribe
7kg8501-0aa12-0aa0 Firmware Subscribe
7kg8501-0aa12-2aa0 Subscribe
7kg8501-0aa12-2aa0 Firmware Subscribe
7kg8501-0aa31-0aa0 Subscribe
7kg8501-0aa31-0aa0 Firmware Subscribe
7kg8501-0aa31-2aa0 Subscribe
7kg8501-0aa31-2aa0 Firmware Subscribe
7kg8501-0aa32-0aa0 Subscribe
7kg8501-0aa32-0aa0 Firmware Subscribe
7kg8501-0aa32-2aa0 Subscribe
7kg8501-0aa32-2aa0 Firmware Subscribe
7kg8550-0aa00-0aa0 Subscribe
7kg8550-0aa00-0aa0 Firmware Subscribe
7kg8550-0aa00-2aa0 Subscribe
7kg8550-0aa00-2aa0 Firmware Subscribe
7kg8550-0aa10-0aa0 Subscribe
7kg8550-0aa10-0aa0 Firmware Subscribe
7kg8550-0aa10-2aa0 Subscribe
7kg8550-0aa10-2aa0 Firmware Subscribe
7kg8550-0aa30-0aa0 Subscribe
7kg8550-0aa30-0aa0 Firmware Subscribe
7kg8550-0aa30-2aa0 Subscribe
7kg8550-0aa30-2aa0 Firmware Subscribe
7kg8551-0aa01-0aa0 Subscribe
7kg8551-0aa01-0aa0 Firmware Subscribe
7kg8551-0aa01-2aa0 Subscribe
7kg8551-0aa01-2aa0 Firmware Subscribe
7kg8551-0aa02-0aa0 Subscribe
7kg8551-0aa02-0aa0 Firmware Subscribe
7kg8551-0aa02-2aa0 Subscribe
7kg8551-0aa02-2aa0 Firmware Subscribe
7kg8551-0aa11-0aa0 Subscribe
7kg8551-0aa11-0aa0 Firmware Subscribe
7kg8551-0aa11-2aa0 Subscribe
7kg8551-0aa11-2aa0 Firmware Subscribe
7kg8551-0aa12-0aa0 Subscribe
7kg8551-0aa12-0aa0 Firmware Subscribe
7kg8551-0aa12-2aa0 Subscribe
7kg8551-0aa12-2aa0 Firmware Subscribe
7kg8551-0aa31-0aa0 Subscribe
7kg8551-0aa31-0aa0 Firmware Subscribe
7kg8551-0aa31-2aa0 Subscribe
7kg8551-0aa31-2aa0 Firmware Subscribe
7kg8551-0aa32-0aa0 Subscribe
7kg8551-0aa32-0aa0 Firmware Subscribe
7kg8551-0aa32-2aa0 Subscribe
7kg8551-0aa32-2aa0 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-34191 A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow authenticated users to access critical device information.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 09 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow authenticated users to access critical device information. A vulnerability has been identified in SICAM T (All versions < V3.0). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow authenticated users to access critical device information.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2025-12-09T10:39:02.024Z

Reserved: 2022-04-28T00:00:00

Link: CVE-2022-29879

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-20T13:15:16.227

Modified: 2025-12-09T16:17:14.007

Link: CVE-2022-29879

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses