Privilege Escalation Vulnerability in SiPass Integrated Systems by Siemens
CVE-2025-27494
9.4CRITICAL
Key Information:
- Vendor
- Siemens
- Vendor
- CVE Published:
- 11 March 2025
Summary
A significant vulnerability exists in the SiPass Integrated AC5102 and ACC-AP systems. This flaw arises from improper input sanitization for the pubkey endpoint of the REST API, enabling an authenticated remote administrator to escalate privileges. By injecting arbitrary commands, attackers could execute them with root privileges, potentially compromising the entire system. Prompt updates to version 6.4.9 or later are recommended to mitigate this risk. For further details, refer to Siemens Security Advisory.
Affected Version(s)
SiPass integrated AC5102 (ACC-G2) 0
SiPass integrated ACC-AP 0
References
CVSS V4
Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved