PatchSiren cyber security CVE debrief
CVE-2024-41795 Siemens CVE debrief
CVE-2024-41795 is a medium-severity CSRF issue affecting the web interface of Siemens SENTRON 7KT PAC1260 Data Manager. According to the 2025-04-08 advisory, an unauthenticated attacker could change arbitrary device settings if a legitimate administrator is tricked into clicking a malicious link while logged in. The advisory states that no fix is currently planned and recommends avoiding untrusted links during authenticated sessions.
- Vendor
- Siemens
- Product
- SENTRON 7KT PAC1260 Data Manager
- CVSS
- MEDIUM 6.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-08
- Original CVE updated
- 2025-04-08
- Advisory published
- 2025-04-08
- Advisory updated
- 2025-04-08
Who should care
Administrators and security teams responsible for Siemens SENTRON 7KT PAC1260 Data Manager deployments, especially where the web interface is accessible in OT/ICS environments.
Technical summary
The advisory describes a cross-site request forgery condition in the device web interface. The CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N, indicating network reachability, no privileges required, user interaction required, and a high integrity impact. The practical risk is unauthorized configuration changes triggered through a malicious link presented to a logged-in administrator.
Defensive priority
Medium to elevated priority for exposed OT management interfaces: the issue requires user interaction, but it can directly alter device settings and the vendor advisory lists no planned fix.
Recommended defensive actions
- Do not open untrusted links while authenticated to the affected device web interface.
- Review Siemens advisory SSA-187636 and the CISA ICS advisory for vendor guidance and status updates.
- Limit access to the management web interface to trusted administrative networks and approved users only.
- Follow CISA ICS recommended practices and defense-in-depth guidance for industrial control systems.
- Monitor device configuration changes for unexpected or unauthorized modifications.
Evidence notes
All statements are based on the supplied CISA CSAF advisory ICSA-25-100-06 and its referenced Siemens materials, published on 2025-04-08. The source text explicitly identifies CSRF in the web interface, the ability to change arbitrary device settings by tricking a legitimate administrator to click a malicious link, the affected product as Siemens SENTRON 7KT PAC1260 Data Manager, the CVSS vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N, and the remediation note that no fix is currently planned.
Official resources
-
CVE-2024-41795 CVE record
CVE.org
-
CVE-2024-41795 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA and the referenced Siemens advisory published this issue on 2025-04-08. The advisory indicates no fix is planned at the time of publication.