First published: Tue Apr 08 2025(Updated: )
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices is vulnerable to Cross-Site Request Forgery (CSRF) attacks. This could allow an unauthenticated attacker to change arbitrary device settings by tricking a legitimate device administrator to click on a malicious link.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
SENTRON 7KT PAC1260 Data Manager | <=latest |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41795 is considered a high severity vulnerability due to the potential for unauthorized changes to device settings.
To mitigate CVE-2024-41795, it is recommended to implement input validation and confirm user actions to prevent CSRF attacks.
CVE-2024-41795 affects all versions of the Siemens SENTRON 7KT PAC1260 Data Manager.
CVE-2024-41795 facilitates Cross-Site Request Forgery (CSRF) attacks that can lead to unauthorized changes in device settings.
Yes, CVE-2024-41795 can be exploited remotely by an unauthenticated attacker through the vulnerable web interface.