Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25573: CWE-73: External Control of File Name or Path in Siemens SICAM SIAPP SDK

0
High
VulnerabilityCVE-2026-25573cvecve-2026-25573cwe-73
Published: Tue Mar 10 2026 (03/10/2026, 16:07:57 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: SICAM SIAPP SDK

Description

A vulnerability has been identified in SICAM SIAPP SDK (All versions < V2.1.7). The affected application builds shell commands with caller-provided strings and executes them. An attacker could influence the executed command, potentially resulting in command injection and full system compromise.

AI-Powered Analysis

AILast updated: 03/10/2026, 17:04:34 UTC

Technical Analysis

CVE-2026-25573 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Siemens SICAM SIAPP SDK versions earlier than 2.1.7. The vulnerability stems from the SDK's method of building shell commands by incorporating strings provided by the caller without adequate validation or sanitization. This unsafe practice enables an attacker to inject arbitrary shell commands that the system will execute with the privileges of the affected application. The vulnerability does not require authentication or user interaction but demands local access, making the attack vector local (AV:L). The attack complexity is high (AC:H), indicating that exploitation requires specific conditions or knowledge. The impact is severe, with potential full system compromise affecting confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the risk remains significant due to the critical nature of industrial control systems that use this SDK. The vulnerability was reserved in early February 2026 and published in March 2026. Siemens has not yet provided a patch link, indicating that remediation may still be pending. The vulnerability highlights the risks of improper input handling in industrial software development kits, especially those interfacing with system-level commands.

Potential Impact

The vulnerability poses a significant risk to organizations using Siemens SICAM SIAPP SDK in their industrial control systems (ICS) and critical infrastructure environments. Successful exploitation could lead to arbitrary command execution, allowing attackers to manipulate system processes, exfiltrate sensitive data, disrupt operations, or deploy further malware. Given the SDK’s role in managing industrial automation and control, a compromise could result in operational downtime, safety hazards, and financial losses. The high impact on confidentiality, integrity, and availability means that attackers could gain control over critical systems, potentially causing cascading failures in industrial environments. Although exploitation requires local access and has high complexity, insider threats or attackers who gain initial footholds could leverage this vulnerability to escalate privileges and move laterally within networks. The absence of known exploits currently reduces immediate risk but does not diminish the urgency for mitigation due to the critical nature of affected systems.

Mitigation Recommendations

1. Apply patches or updates from Siemens as soon as they become available to address this vulnerability in SICAM SIAPP SDK. 2. Until patches are released, restrict local access to systems running the vulnerable SDK to trusted personnel only, employing strict access controls and monitoring. 3. Implement application whitelisting and restrict execution of shell commands from the SDK or related processes to prevent unauthorized command execution. 4. Conduct thorough input validation and sanitization on all inputs that may influence command construction, especially those originating from external or untrusted sources. 5. Monitor system logs and command execution traces for unusual or suspicious activity indicative of command injection attempts. 6. Employ network segmentation to isolate industrial control systems from general IT networks, reducing the risk of lateral movement. 7. Educate staff about the risks of local access exploitation and enforce strong endpoint security controls to prevent unauthorized access. 8. Consider deploying host-based intrusion detection systems (HIDS) tailored to detect command injection patterns on affected hosts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2026-02-02T23:19:09.478Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b04b8cea502d3aa873baaf

Added to database: 3/10/2026, 4:49:16 PM

Last enriched: 3/10/2026, 5:04:34 PM

Last updated: 3/13/2026, 8:28:19 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses