CVE-2026-25569
Out-of-Bounds Write in SICAM SIAPP SDK Enables Code Execution
Publication date: 2026-03-10
Last updated on: 2026-03-13
Assigner: Siemens AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| siemens | sicam_siapp_sdk | to 2.17 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-25569 is an out-of-bounds write vulnerability found in the Siemens SICAM SIAPP SDK versions earlier than 2.1.7. This vulnerability allows an attacker to write data beyond the intended buffer boundaries.
Such an out-of-bounds write can lead to serious issues like denial of service or arbitrary code execution, meaning an attacker could potentially crash the application or run malicious code.
How can this vulnerability impact me? :
Exploitation of this vulnerability can result in denial of service, causing the affected application or system to crash or become unavailable.
More severely, it can allow an attacker to execute arbitrary code, potentially gaining control over the affected system or application.
Additionally, it may lead to data corruption within customer-developed SIAPP applications or exploitation of the simulation environment.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate the vulnerability in SICAM SIAPP SDK (all versions prior to 2.1.7), Siemens recommends updating to version 2.1.7 or later.
Additional mitigation steps include applying Siemensβ security updates using the recommended tooling and procedures, validating updates prior to deployment, and protecting network access through firewalls, network segmentation, and VPNs.
Operators of critical power systems should ensure multi-level redundant secondary protection schemes are in place to minimize the risk of cyber incidents.