VYPR
High severity7.5NVD Advisory· Published Mar 26, 2026· Updated Apr 14, 2026

CVE-2026-27664

CVE-2026-27664

Description

A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), SICORE Base system (All versions < V26.10.0). The affected application contains an out-of-bounds write vulnerability while parsing specially crafted XML inputs. This could allow an unauthenticated attacker to exploit this issue by sending a malicious XML request, which may cause the service to crash, resulting in a denial-of-service condition.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An out-of-bounds write vulnerability in Siemens SICAM A8000 devices allows unauthenticated attackers to cause denial of service via crafted XML input.

Vulnerability

Overview

An out-of-bounds write vulnerability exists in the CPCI85 Central Processing/Communication and SICORE Base system components of Siemens SICAM A8000 devices (CP-8031, CP-8050, CP-8010, CP-8012) when parsing specially crafted XML inputs [1][2]. The flaw stems from insufficient bounds checking during XML processing, allowing an attacker to write data beyond allocated memory boundaries.

Exploitation

An unauthenticated attacker can exploit this vulnerability by sending a malicious XML request to the affected service over the network [1]. No authentication or prior access is required, making the attack surface accessible to any network entity that can reach the device. The vulnerability affects all firmware versions prior to V26.10 [1][2].

Impact

Successful exploitation causes the service to crash, resulting in a denial-of-service condition [2]. Given the use of these devices in critical power grid infrastructure, a sustained denial of service could disrupt monitoring and control functions. The CVSS v3.1 base score is 7.5 (High), and the CVSS v4.0 score is 8.7 (High) [2].

Mitigation

Siemens has released firmware version V26.10 to address this vulnerability [1][2]. Users are strongly advised to update affected devices to the latest version. No workarounds are documented; the vendor recommends following general security practices for critical infrastructure systems [2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.