A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793).
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/html/ssa-187636.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
23 Sep 2025, 16:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:siemens:7kt_pac1260_data_manager:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:7kt_pac1260_data_manager_firmware:*:*:*:*:*:*:*:* |
|
References | () https://cert-portal.siemens.com/productcert/html/ssa-187636.html - Vendor Advisory | |
First Time |
Siemens
Siemens 7kt Pac1260 Data Manager Firmware Siemens 7kt Pac1260 Data Manager |
08 Apr 2025, 18:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Apr 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-08 09:15
Updated : 2025-09-23 16:13
NVD link : CVE-2024-41794
Mitre link : CVE-2024-41794
CVE.ORG link : CVE-2024-41794
JSON object : View
Products Affected
siemens
- 7kt_pac1260_data_manager_firmware
- 7kt_pac1260_data_manager
CWE
CWE-798
Use of Hard-coded Credentials