CVE-2023-30901: CWE-352: Cross-Site Request Forgery (CSRF) in Siemens SICAM P850
A vulnerability has been identified in SICAM P850 (7KG8500-0AA00-0AA0) (All versions < V3.11), SICAM P850 (7KG8500-0AA00-2AA0) (All versions < V3.11), SICAM P850 (7KG8500-0AA10-0AA0) (All versions < V3.11), SICAM P850 (7KG8500-0AA10-2AA0) (All versions < V3.11), SICAM P850 (7KG8500-0AA30-0AA0) (All versions < V3.11), SICAM P850 (7KG8500-0AA30-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA01-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA01-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA02-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA02-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA11-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA11-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA12-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA12-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA31-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA31-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA32-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA32-2AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA00-0AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA00-2AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA10-0AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA10-2AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA30-0AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA30-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA01-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA01-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA02-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA02-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA11-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA11-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA12-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA12-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA31-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA31-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA32-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA32-2AA0) (All versions < V3.11). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user.
AI Analysis
Technical Summary
CVE-2023-30901 identifies a Cross-Site Request Forgery (CSRF) vulnerability in Siemens SICAM P850 and P855 devices, specifically all versions prior to V3.11. These devices are widely used in industrial control systems (ICS) for energy distribution and automation. The vulnerability exists in the web interface, which lacks adequate CSRF protections such as anti-CSRF tokens or same-site cookie attributes. An attacker can exploit this by crafting a malicious link or webpage that, when visited by an authenticated user of the SICAM device's web interface, causes the victim's browser to send unauthorized commands to the device. This could lead to unauthorized configuration changes or control commands executed with the victim’s privileges. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) indicates that the attack can be performed remotely over the network with low attack complexity, requires no privileges, but does require user interaction. The impact is limited to integrity as confidentiality and availability are not directly affected. Siemens has released version 3.11 to address this issue, but no public exploit code or active exploitation has been reported. The vulnerability underscores the importance of secure web interface design in ICS devices, especially those exposed to enterprise or internet networks.
Potential Impact
For European organizations, especially those operating critical infrastructure such as power grids, water treatment, and industrial automation, this vulnerability poses a risk of unauthorized configuration changes that could disrupt operations or degrade system integrity. While the vulnerability does not directly compromise confidentiality or availability, integrity violations in ICS environments can lead to unsafe states or operational failures. Given Siemens SICAM devices are widely deployed across Europe in energy and utility sectors, exploitation could facilitate sabotage or espionage by adversaries leveraging social engineering to trick authorized personnel. The requirement for user interaction limits mass exploitation but targeted attacks against key personnel remain a concern. The medium CVSS score reflects moderate risk, but the critical nature of affected systems elevates the potential impact. Organizations may face regulatory and compliance consequences if such vulnerabilities are exploited, especially under EU cybersecurity directives for critical infrastructure protection.
Mitigation Recommendations
1. Upgrade all affected Siemens SICAM P850 and P855 devices to firmware version 3.11 or later, which includes patches to mitigate the CSRF vulnerability. 2. Restrict access to the devices’ web interfaces to trusted internal networks only, using network segmentation and firewall rules to minimize exposure. 3. Implement multi-factor authentication (MFA) for web interface access to reduce risk from compromised credentials. 4. Educate and train users on the risks of phishing and social engineering attacks that could lead to CSRF exploitation, emphasizing caution with unsolicited links. 5. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) capable of detecting and blocking CSRF attack patterns. 6. Regularly audit device configurations and logs for unauthorized changes indicative of exploitation attempts. 7. Where possible, disable or limit web interface functionality to only necessary users and functions. 8. Monitor Siemens advisories for any updates or additional patches related to this vulnerability.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2023-30901: CWE-352: Cross-Site Request Forgery (CSRF) in Siemens SICAM P850
Description
A vulnerability has been identified in SICAM P850 (7KG8500-0AA00-0AA0) (All versions < V3.11), SICAM P850 (7KG8500-0AA00-2AA0) (All versions < V3.11), SICAM P850 (7KG8500-0AA10-0AA0) (All versions < V3.11), SICAM P850 (7KG8500-0AA10-2AA0) (All versions < V3.11), SICAM P850 (7KG8500-0AA30-0AA0) (All versions < V3.11), SICAM P850 (7KG8500-0AA30-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA01-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA01-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA02-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA02-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA11-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA11-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA12-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA12-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA31-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA31-2AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA32-0AA0) (All versions < V3.11), SICAM P850 (7KG8501-0AA32-2AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA00-0AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA00-2AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA10-0AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA10-2AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA30-0AA0) (All versions < V3.11), SICAM P855 (7KG8550-0AA30-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA01-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA01-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA02-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA02-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA11-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA11-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA12-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA12-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA31-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA31-2AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA32-0AA0) (All versions < V3.11), SICAM P855 (7KG8551-0AA32-2AA0) (All versions < V3.11). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery attacks. By tricking an authenticated victim user to click a malicious link, an attacker could perform arbitrary actions on the device on behalf of the victim user.
AI-Powered Analysis
Technical Analysis
CVE-2023-30901 identifies a Cross-Site Request Forgery (CSRF) vulnerability in Siemens SICAM P850 and P855 devices, specifically all versions prior to V3.11. These devices are widely used in industrial control systems (ICS) for energy distribution and automation. The vulnerability exists in the web interface, which lacks adequate CSRF protections such as anti-CSRF tokens or same-site cookie attributes. An attacker can exploit this by crafting a malicious link or webpage that, when visited by an authenticated user of the SICAM device's web interface, causes the victim's browser to send unauthorized commands to the device. This could lead to unauthorized configuration changes or control commands executed with the victim’s privileges. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) indicates that the attack can be performed remotely over the network with low attack complexity, requires no privileges, but does require user interaction. The impact is limited to integrity as confidentiality and availability are not directly affected. Siemens has released version 3.11 to address this issue, but no public exploit code or active exploitation has been reported. The vulnerability underscores the importance of secure web interface design in ICS devices, especially those exposed to enterprise or internet networks.
Potential Impact
For European organizations, especially those operating critical infrastructure such as power grids, water treatment, and industrial automation, this vulnerability poses a risk of unauthorized configuration changes that could disrupt operations or degrade system integrity. While the vulnerability does not directly compromise confidentiality or availability, integrity violations in ICS environments can lead to unsafe states or operational failures. Given Siemens SICAM devices are widely deployed across Europe in energy and utility sectors, exploitation could facilitate sabotage or espionage by adversaries leveraging social engineering to trick authorized personnel. The requirement for user interaction limits mass exploitation but targeted attacks against key personnel remain a concern. The medium CVSS score reflects moderate risk, but the critical nature of affected systems elevates the potential impact. Organizations may face regulatory and compliance consequences if such vulnerabilities are exploited, especially under EU cybersecurity directives for critical infrastructure protection.
Mitigation Recommendations
1. Upgrade all affected Siemens SICAM P850 and P855 devices to firmware version 3.11 or later, which includes patches to mitigate the CSRF vulnerability. 2. Restrict access to the devices’ web interfaces to trusted internal networks only, using network segmentation and firewall rules to minimize exposure. 3. Implement multi-factor authentication (MFA) for web interface access to reduce risk from compromised credentials. 4. Educate and train users on the risks of phishing and social engineering attacks that could lead to CSRF exploitation, emphasizing caution with unsolicited links. 5. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) capable of detecting and blocking CSRF attack patterns. 6. Regularly audit device configurations and logs for unauthorized changes indicative of exploitation attempts. 7. Where possible, disable or limit web interface functionality to only necessary users and functions. 8. Monitor Siemens advisories for any updates or additional patches related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- siemens
- Date Reserved
- 2023-04-20T12:49:03.482Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6913a08cf4d5bbdab5b1c77c
Added to database: 11/11/2025, 8:46:04 PM
Last enriched: 11/11/2025, 9:04:15 PM
Last updated: 12/3/2025, 3:58:11 PM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7044: CWE-269 Improper Privilege Management in Ubuntu MAAS
HighCVE-2025-57199: n/a
UnknownCVE-2025-55182: Deserialization of Untrusted Data (CWE-502) in Meta react-server-dom-webpack
CriticalCVE-2025-57201: n/a
UnknownCVE-2025-57198: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.