PatchSiren cyber security CVE debrief
CVE-2024-41789 Siemens CVE debrief
On 2025-04-08, CISA published CVE-2024-41789 for Siemens SENTRON 7KT PAC1260 Data Manager. The issue affects the device web interface and can allow an authenticated remote attacker to execute arbitrary code with root privileges. Siemens and CISA list no fix as currently planned, which makes compensating controls especially important.
- Vendor
- Siemens
- Product
- SENTRON 7KT PAC1260 Data Manager
- CVSS
- CRITICAL 9.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-08
- Original CVE updated
- 2025-04-08
- Advisory published
- 2025-04-08
- Advisory updated
- 2025-04-08
Who should care
Organizations operating Siemens SENTRON 7KT PAC1260 Data Manager devices, especially OT/ICS teams, plant administrators, network defenders, and anyone responsible for access control, segmentation, and patch tracking in industrial environments.
Technical summary
According to the CISA CSAF advisory and Siemens references, the web interface does not sanitize the language parameter in specific POST requests. The reported impact is authenticated remote code execution with root privileges. CISA records the CVSS v3.1 vector as AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H (9.1, Critical). The advisory also states that no fix is currently planned for the affected product.
Defensive priority
Immediate / Critical
Recommended defensive actions
- Review whether Siemens SENTRON 7KT PAC1260 Data Manager devices are deployed in your environment and map all exposed management interfaces.
- Restrict access to the device web interface to trusted administrative networks only, using segmentation and allowlisting where possible.
- Enforce strong authentication and tightly limit administrative accounts because successful exploitation requires authenticated access.
- Monitor for unusual POST activity against the device web interface and investigate unexpected administrative sessions or configuration changes.
- Apply vendor and CISA guidance from the linked advisories, and track Siemens notifications in case a remediation becomes available.
- Use layered OT/ICS defenses and compensating controls consistent with CISA recommended practices while no fix is planned.
Evidence notes
This debrief is based only on the supplied CISA CSAF advisory data and the linked Siemens/CISA references. The source states: the web interface does not sanitize the language parameter in specific POST requests; an authenticated remote attacker could execute arbitrary code with root privileges; and no fix is currently planned. The advisory published date used here is 2025-04-08.
Official resources
-
CVE-2024-41789 CVE record
CVE.org
-
CVE-2024-41789 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed on 2025-04-08 via CISA advisory ICSA-25-100-06, with Siemens advisory SSA-187636 cited in the source references.