CVE-2026-27664
Description
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), SICORE Base system (All versions < V26.10.0). The affected application contains an out-of-bounds write vulnerability while parsing specially crafted XML inputs. This could allow an unauthenticated attacker to exploit this issue by sending a malicious XML request, which may cause the service to crash, resulting in a denial-of-service condition.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An out-of-bounds write vulnerability in Siemens SICAM A8000 devices allows unauthenticated attackers to cause denial of service via crafted XML input.
Vulnerability
Overview
An out-of-bounds write vulnerability exists in the CPCI85 Central Processing/Communication and SICORE Base system components of Siemens SICAM A8000 devices (CP-8031, CP-8050, CP-8010, CP-8012) when parsing specially crafted XML inputs [1][2]. The flaw stems from insufficient bounds checking during XML processing, allowing an attacker to write data beyond allocated memory boundaries.
Exploitation
An unauthenticated attacker can exploit this vulnerability by sending a malicious XML request to the affected service over the network [1]. No authentication or prior access is required, making the attack surface accessible to any network entity that can reach the device. The vulnerability affects all firmware versions prior to V26.10 [1][2].
Impact
Successful exploitation causes the service to crash, resulting in a denial-of-service condition [2]. Given the use of these devices in critical power grid infrastructure, a sustained denial of service could disrupt monitoring and control functions. The CVSS v3.1 base score is 7.5 (High), and the CVSS v4.0 score is 8.7 (High) [2].
Mitigation
Siemens has released firmware version V26.10 to address this vulnerability [1][2]. Users are strongly advised to update affected devices to the latest version. No workarounds are documented; the vendor recommends following general security practices for critical infrastructure systems [2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: < V26.10.0
- Range: < V26.10
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.