{"uuid": "25810a8b-9012-4474-bb66-662af0c8f17f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41794", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10879", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41794\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793).\n\ud83d\udccf Published: 2025-04-08T08:22:11.279Z\n\ud83d\udccf Modified: 2025-04-08T08:22:11.279Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:42.000000Z"}