PatchSiren cyber security CVE debrief
CVE-2026-27668 Siemens CVE debrief
CVE-2026-27668 describes an authenticated privilege-escalation issue in Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) versions before 5.8. The advisory states that User Administrators are allowed to administer groups they belong to, which can let a User Administrator elevate their own privileges and grant themselves access to any device group at any access level. The supplied CVSS v3.1 score is 8.8 (HIGH), reflecting network exposure, low attack complexity, and high impact if an attacker already has a User Administrator account.
- Vendor
- Siemens
- Product
- RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P)
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-14
- Original CVE updated
- 2026-04-21
- Advisory published
- 2026-04-14
- Advisory updated
- 2026-04-21
Who should care
OT/ICS operators running Siemens RUGGEDCOM CROSSBOW SAM-P before v5.8, administrators managing User Administrator accounts, and security teams responsible for access-control boundaries in industrial environments.
Technical summary
The issue is an access-control flaw: a role intended to administer only certain groups can be used by an authenticated User Administrator to extend privileges beyond the intended boundary. The affected product scope in the supplied advisory is Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) versions earlier than 5.8. Siemens remediation is to update to V5.8 or later.
Defensive priority
High—prioritize patching to V5.8 or later during the next maintenance window, especially where SAM-P governs access to production OT devices.
Recommended defensive actions
- Upgrade Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) to V5.8 or later.
- Identify all deployments of SAM-P and confirm which versions are below 5.8.
- Review User Administrator assignments and remove unnecessary privileged accounts.
- Audit device-group permissions and recent administrative changes for unexpected access expansion.
- Apply OT defense-in-depth and least-privilege controls around management access as recommended by CISA and Siemens.
Evidence notes
The supplied CISA CSAF source and linked Siemens advisories state that this vulnerability affects Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) vers:intdot/<5.8 and that the vendor fix is V5.8 or later. The advisory text explicitly says User Administrators can administer groups they belong to, enabling privilege escalation and access to any device group at any access level. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H with a score of 8.8 (HIGH). The source timeline shows publication on 2026-04-14 and republication on 2026-04-21; no KEV entry is provided in the supplied data.
Official resources
-
CVE-2026-27668 CVE record
CVE.org
-
CVE-2026-27668 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Published by the source advisory on 2026-04-14 and republished by CISA on 2026-04-21. No KEV listing is included in the supplied timeline.