PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-41794 Siemens CVE debrief

CVE-2024-41794 affects Siemens SENTRON 7KT PAC1260 Data Manager devices that contain hardcoded credentials for remote access to the device operating system with root privileges. If an attacker has those credentials and SSH is enabled, they may gain full access to the device. The advisory is rated CVSS 10.0/CRITICAL, and Siemens currently reports that no fix is planned.

Vendor
Siemens
Product
SENTRON 7KT PAC1260 Data Manager
CVSS
CRITICAL 10
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-08
Original CVE updated
2025-04-08
Advisory published
2025-04-08
Advisory updated
2025-04-08

Who should care

Siemens SENTRON 7KT PAC1260 operators, OT/ICS asset owners, plant engineers, and defenders responsible for remote access control and network segmentation.

Technical summary

The source advisory states that affected devices expose hardcoded credentials usable for remote OS access as root. The attack vector is network-based and requires no user interaction. The practical impact is complete compromise of confidentiality, integrity, and availability if the credentials are known and SSH is reachable. The advisory also notes the issue may be reachable when SSH is enabled, including via exploitation of CVE-2024-41793.

Defensive priority

Immediate

Recommended defensive actions

  • Inventory all Siemens SENTRON 7KT PAC1260 Data Manager deployments and confirm whether SSH is enabled.
  • Restrict SSH to trusted management networks only; block it from untrusted or flat networks.
  • Strengthen OT network segmentation and remove direct exposure of the device to the internet or other nonessential networks.
  • Review whether any deployments could have used the hardcoded access path and treat exposed systems as high risk.
  • Monitor Siemens and CISA advisories for updates; Siemens currently lists no fix planned, so rely on compensating controls.

Evidence notes

This debrief is based only on the supplied CISA CSAF source and linked official references. The source published on 2025-04-08 describes hardcoded credentials for remote OS access with root privileges, states that full device access may result if the credentials are known and SSH is enabled, and lists no planned fix for the affected product. The CVSS vector provided is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H.

Official resources

Publicly disclosed on 2025-04-08 in CISA advisory ICSA-25-100-06 and Siemens advisory SSA-187636.