Vulnerability Description
A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the language parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Siemens | 7Kt Pac1260 Data Manager Firmware | All versions |
| Siemens | 7Kt Pac1260 Data Manager | - |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-41789?
CVE-2024-41789 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the language parameter in specific POST requests. This c...
How severe is CVE-2024-41789?
CVE-2024-41789 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-41789?
Check the references section above for vendor advisories and patch information. Affected products include: Siemens 7Kt Pac1260 Data Manager Firmware, Siemens 7Kt Pac1260 Data Manager.