PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-27668 Siemens CVE debrief

CVE-2026-27668 describes an authenticated privilege-escalation issue in Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) versions before 5.8. The advisory states that User Administrators are allowed to administer groups they belong to, which can let a User Administrator elevate their own privileges and grant themselves access to any device group at any access level. The supplied CVSS v3.1 score is 8.8 (HIGH), reflecting network exposure, low attack complexity, and high impact if an attacker already has a User Administrator account.

Vendor
Siemens
Product
RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P)
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-04-14
Original CVE updated
2026-04-21
Advisory published
2026-04-14
Advisory updated
2026-04-21

Who should care

OT/ICS operators running Siemens RUGGEDCOM CROSSBOW SAM-P before v5.8, administrators managing User Administrator accounts, and security teams responsible for access-control boundaries in industrial environments.

Technical summary

The issue is an access-control flaw: a role intended to administer only certain groups can be used by an authenticated User Administrator to extend privileges beyond the intended boundary. The affected product scope in the supplied advisory is Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) versions earlier than 5.8. Siemens remediation is to update to V5.8 or later.

Defensive priority

High—prioritize patching to V5.8 or later during the next maintenance window, especially where SAM-P governs access to production OT devices.

Recommended defensive actions

  • Upgrade Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) to V5.8 or later.
  • Identify all deployments of SAM-P and confirm which versions are below 5.8.
  • Review User Administrator assignments and remove unnecessary privileged accounts.
  • Audit device-group permissions and recent administrative changes for unexpected access expansion.
  • Apply OT defense-in-depth and least-privilege controls around management access as recommended by CISA and Siemens.

Evidence notes

The supplied CISA CSAF source and linked Siemens advisories state that this vulnerability affects Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) vers:intdot/<5.8 and that the vendor fix is V5.8 or later. The advisory text explicitly says User Administrators can administer groups they belong to, enabling privilege escalation and access to any device group at any access level. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H with a score of 8.8 (HIGH). The source timeline shows publication on 2026-04-14 and republication on 2026-04-21; no KEV entry is provided in the supplied data.

Official resources

Published by the source advisory on 2026-04-14 and republished by CISA on 2026-04-21. No KEV listing is included in the supplied timeline.