First published: Tue Apr 08 2025(Updated: )
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the region parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
SENTRON 7KT PAC1260 Data Manager | <= |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41790 is rated as critical due to its potential to allow authenticated remote attackers to execute arbitrary code with root privileges.
To fix CVE-2024-41790, ensure that you implement the latest security updates provided by Siemens for the SENTRON 7KT PAC1260 Data Manager.
All versions of the Siemens SENTRON 7KT PAC1260 Data Manager are affected by CVE-2024-41790.
CVE-2024-41790 is caused by the lack of proper sanitization of the region parameter in the web interface of the device.
No, CVE-2024-41790 requires an authenticated user to exploit the vulnerability and execute arbitrary code.