Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-31238: CWE-732: Incorrect Permission Assignment for Critical Resource in Siemens SICAM P850

0
Medium
VulnerabilityCVE-2023-31238cvecve-2023-31238cwe-732
Published: Tue Jun 13 2023 (06/13/2023, 08:17:13 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: SICAM P850

Description

CVE-2023-31238 is a medium-severity vulnerability affecting multiple versions of Siemens SICAM P850 and related products prior to version 3. 11. The issue stems from incorrect permission assignment related to cookie protection flags, allowing attackers who obtain a session token to impersonate legitimate users. Exploitation requires network access with low privileges and user interaction, and the vulnerability impacts confidentiality, integrity, and availability to a limited extent. No known exploits are currently reported in the wild. European organizations using SICAM P850 devices, especially in critical infrastructure sectors like energy and utilities, are at risk. Mitigation involves upgrading to version 3. 11 or later and implementing strict session management and network segmentation. Countries with significant Siemens industrial control system deployments, such as Germany, France, and the UK, are most likely affected.

AI-Powered Analysis

AILast updated: 12/16/2025, 11:44:44 UTC

Technical Analysis

CVE-2023-31238 identifies a vulnerability in Siemens SICAM P850 and related products (including SICAM P855 and SICAM T) in all versions prior to 3.11. The root cause is an incorrect permission assignment for critical resources, specifically the absence of cookie protection flags under default settings. Cookies lacking flags such as Secure, HttpOnly, or SameSite can be intercepted or manipulated by attackers who gain access to session tokens. This vulnerability falls under CWE-732 (Incorrect Permission Assignment for Critical Resource). An attacker with network access and low privileges, requiring user interaction, can leverage a stolen session token to impersonate legitimate users, potentially gaining unauthorized access to the device’s management interface or control functions. The CVSS v3.1 score is 5.5 (medium), reflecting network attack vector, high attack complexity, low privileges required, and user interaction needed. The vulnerability affects confidentiality, integrity, and availability but with limited impact scope. No public exploits are known, but the risk is significant given the critical nature of SICAM devices in industrial control systems, especially in energy distribution and automation. Siemens has reserved the CVE and published details but no patch links are currently provided, indicating the need for vigilance and prompt updates once available.

Potential Impact

European organizations operating Siemens SICAM P850 and related products in critical infrastructure sectors such as energy, utilities, and industrial automation face risks of unauthorized access and session hijacking. Successful exploitation could allow attackers to impersonate legitimate users, potentially leading to unauthorized control commands, data manipulation, or disruption of industrial processes. This could result in operational downtime, safety hazards, and regulatory non-compliance. Given the widespread deployment of Siemens industrial control systems in Europe, the impact could extend to national critical infrastructure, affecting grid stability and service continuity. Confidentiality breaches could expose sensitive operational data, while integrity and availability impacts could disrupt essential services. The medium severity score reflects moderate ease of exploitation but significant consequences if exploited.

Mitigation Recommendations

1. Upgrade all affected Siemens SICAM P850, P855, and SICAM T devices to version 3.11 or later as soon as the patch becomes available from Siemens. 2. Until patches are applied, implement strict network segmentation to isolate SICAM devices from general IT networks and limit access to trusted administrators only. 3. Enforce multi-factor authentication (MFA) for all management interfaces to reduce the risk of session token misuse. 4. Monitor network traffic for unusual session token usage or repeated authentication failures that could indicate exploitation attempts. 5. Configure web application firewalls (WAFs) or intrusion detection systems (IDS) to detect and block suspicious cookie manipulation or session hijacking attempts. 6. Educate users and administrators about phishing and social engineering risks that could facilitate session token theft. 7. Regularly audit and review access permissions and session management policies on SICAM devices to ensure adherence to security best practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2023-04-26T17:03:00.579Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6913a08cf4d5bbdab5b1c783

Added to database: 11/11/2025, 8:46:04 PM

Last enriched: 12/16/2025, 11:44:44 AM

Last updated: 1/19/2026, 5:21:44 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats