PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-41789 Siemens CVE debrief

On 2025-04-08, CISA published CVE-2024-41789 for Siemens SENTRON 7KT PAC1260 Data Manager. The issue affects the device web interface and can allow an authenticated remote attacker to execute arbitrary code with root privileges. Siemens and CISA list no fix as currently planned, which makes compensating controls especially important.

Vendor
Siemens
Product
SENTRON 7KT PAC1260 Data Manager
CVSS
CRITICAL 9.1
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-08
Original CVE updated
2025-04-08
Advisory published
2025-04-08
Advisory updated
2025-04-08

Who should care

Organizations operating Siemens SENTRON 7KT PAC1260 Data Manager devices, especially OT/ICS teams, plant administrators, network defenders, and anyone responsible for access control, segmentation, and patch tracking in industrial environments.

Technical summary

According to the CISA CSAF advisory and Siemens references, the web interface does not sanitize the language parameter in specific POST requests. The reported impact is authenticated remote code execution with root privileges. CISA records the CVSS v3.1 vector as AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H (9.1, Critical). The advisory also states that no fix is currently planned for the affected product.

Defensive priority

Immediate / Critical

Recommended defensive actions

  • Review whether Siemens SENTRON 7KT PAC1260 Data Manager devices are deployed in your environment and map all exposed management interfaces.
  • Restrict access to the device web interface to trusted administrative networks only, using segmentation and allowlisting where possible.
  • Enforce strong authentication and tightly limit administrative accounts because successful exploitation requires authenticated access.
  • Monitor for unusual POST activity against the device web interface and investigate unexpected administrative sessions or configuration changes.
  • Apply vendor and CISA guidance from the linked advisories, and track Siemens notifications in case a remediation becomes available.
  • Use layered OT/ICS defenses and compensating controls consistent with CISA recommended practices while no fix is planned.

Evidence notes

This debrief is based only on the supplied CISA CSAF advisory data and the linked Siemens/CISA references. The source states: the web interface does not sanitize the language parameter in specific POST requests; an authenticated remote attacker could execute arbitrary code with root privileges; and no fix is currently planned. The advisory published date used here is 2025-04-08.

Official resources

Publicly disclosed on 2025-04-08 via CISA advisory ICSA-25-100-06, with Siemens advisory SSA-187636 cited in the source references.