{"vulnerability": "CVE-2024-4179", "sightings": [{"uuid": "96bcb01b-93c2-4694-bf51-9ce1f768c5ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41798", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-284-04", "content": "", "creation_timestamp": "2024-10-10T12:00:00.000000Z"}, {"uuid": "1188b743-40d2-4990-9326-8d8d4a088beb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308178260624821", "content": "", "creation_timestamp": "2025-04-09T13:13:00.923229Z"}, {"uuid": "4c6bde83-242e-44f8-9738-bbea906a2128", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41790", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114302182968889372", "content": "", "creation_timestamp": "2025-04-08T11:48:20.992670Z"}, {"uuid": "bbd2b956-09fc-4113-8732-9c5ac22ec54c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41792", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114302183018844167", "content": "", "creation_timestamp": "2025-04-08T11:48:21.553621Z"}, {"uuid": "d16597b2-c9fc-447a-bd2f-72191da6333a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114302183063361300", "content": "", "creation_timestamp": "2025-04-08T11:48:21.860061Z"}, {"uuid": "0eac333a-1c35-4ae4-ba39-8e4e5d7ef32c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41794", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114302183086997696", "content": "", "creation_timestamp": "2025-04-08T11:48:22.164943Z"}, {"uuid": "8251ee93-065b-475c-9465-b59bccba280d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41794", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmcgsnmq422q", "content": "", "creation_timestamp": "2025-04-08T12:07:11.791640Z"}, {"uuid": "065afd0d-2bff-4ff7-b29c-9e9b636235c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41792", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmcgsofoyl24", "content": "", "creation_timestamp": "2025-04-08T12:07:14.189917Z"}, {"uuid": "d866e7c5-44d9-4959-b00d-38d39ca71fce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41790", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmcgsoizgx2v", "content": "", "creation_timestamp": "2025-04-08T12:07:14.710180Z"}, {"uuid": "d6d443cc-f579-4354-8c0c-d7f122e2d06c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmcgsorjtk2q", "content": "", "creation_timestamp": "2025-04-08T12:07:15.413337Z"}, {"uuid": "c952b61b-ef30-48ea-a7ce-399dd6e99420", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41790", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lmc6m7ndqt2k", "content": "", "creation_timestamp": "2025-04-08T09:40:25.124438Z"}, {"uuid": "c9025b6c-9b0e-4dfe-8c8e-663eb4cda88a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41794", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lmc6mamzfi2h", "content": "", "creation_timestamp": "2025-04-08T09:40:26.174430Z"}, {"uuid": "aa430ade-660f-466b-ac0b-30239f30a07a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41794", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308178260624821", "content": "", "creation_timestamp": "2025-04-09T13:13:00.980450Z"}, {"uuid": "a6b6d113-34d6-4cbe-8ad4-2f9ce8f43682", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41790", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308206326034766", "content": "", "creation_timestamp": "2025-04-09T13:20:09.353623Z"}, {"uuid": "49fc85ad-22f4-414f-b0c9-4cfabfd60a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41792", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308206326034766", "content": "", "creation_timestamp": "2025-04-09T13:20:09.469027Z"}, {"uuid": "ffda39e3-0d76-46e4-b654-03f9d0fa2f92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41794", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308245161736730", "content": "", "creation_timestamp": "2025-04-09T13:30:01.617666Z"}, {"uuid": "f3ed26c1-7155-4dac-ab3f-43580da8be30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41790", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "4b62fe6e-180e-45c7-b583-10d5307c150e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41791", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "bf39548f-fb46-4c59-b04e-14e7ed1cd195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41792", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "256967c9-be99-4e2a-b42c-6abff585e04e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "da71258f-9fd3-44fb-b144-8573feb0e3e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41794", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "434483f9-e1de-495f-8e96-f6b685cb18bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41795", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "5e826326-66d9-4122-a011-597179dcaa56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41796", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "b8104ac5-5b64-486f-a4ec-19e3f6b025f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41790", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10887", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41790\n\ud83d\udd25 CVSS Score: 9.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not sanitize the region parameter in specific POST requests. This could allow an authenticated remote attacker to execute arbitrary code with root privileges.\n\ud83d\udccf Published: 2025-04-08T08:22:04.239Z\n\ud83d\udccf Modified: 2025-04-08T08:22:04.239Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:52.000000Z"}, {"uuid": "bb616bed-9bc2-4a6a-87fc-2e9bceb5296c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41797", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-03", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "04750e33-97a5-42ad-a9a6-07955c3ac4ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10880", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41793\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices provides an endpoint that allows to enable the ssh service without authentication. This could allow an unauthenticated remote attacker to enable remote access to the device via ssh.\n\ud83d\udccf Published: 2025-04-08T08:22:09.907Z\n\ud83d\udccf Modified: 2025-04-08T08:22:09.907Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:43.000000Z"}, {"uuid": "d6b9c743-449f-4e39-841d-35e61a663080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41792", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10884", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41792\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices contains a path traversal vulnerability. This could allow an unauthenticated attacker it to access arbitrary files on the device with root privileges.\n\ud83d\udccf Published: 2025-04-08T08:22:08.546Z\n\ud83d\udccf Modified: 2025-04-08T08:22:08.546Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:49.000000Z"}, {"uuid": "6aa626f9-6c51-4d2f-97db-fc23f8e44636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41791", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10886", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41791\n\ud83d\udd25 CVSS Score: 7.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices does not authenticate report creation requests. This could allow an unauthenticated remote attacker to read or clear the log files on the device, reset the device or set the date and time.\n\ud83d\udccf Published: 2025-04-08T08:22:05.720Z\n\ud83d\udccf Modified: 2025-04-08T08:22:05.720Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:51.000000Z"}, {"uuid": "f39a3cf7-fd2c-4d79-965b-a866b134a71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41795", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10878", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41795\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices is vulnerable to Cross-Site Request Forgery (CSRF) attacks. This could allow an unauthenticated attacker to change arbitrary device settings by tricking a legitimate device administrator to click on a malicious link.\n\ud83d\udccf Published: 2025-04-08T08:22:12.685Z\n\ud83d\udccf Modified: 2025-04-08T08:22:12.685Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:41.000000Z"}, {"uuid": "37c215fe-559c-4919-9f13-b040f6627fe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10879", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41794\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793).\n\ud83d\udccf Published: 2025-04-08T08:22:11.279Z\n\ud83d\udccf Modified: 2025-04-08T08:22:11.279Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:42.000000Z"}, {"uuid": "25810a8b-9012-4474-bb66-662af0c8f17f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41794", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10879", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41794\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793).\n\ud83d\udccf Published: 2025-04-08T08:22:11.279Z\n\ud83d\udccf Modified: 2025-04-08T08:22:11.279Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:42.000000Z"}, {"uuid": "0adb7ffc-b521-4c95-bac3-d86e755f3298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41795", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10877", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41796\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices allows to change the login password without knowing the current password. In combination with a prepared CSRF attack (CVE-2024-41795) an unauthenticated attacker could be able to set the password to an attacker-controlled value.\n\ud83d\udccf Published: 2025-04-08T08:22:14.357Z\n\ud83d\udccf Modified: 2025-04-08T08:22:14.357Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:40.000000Z"}, {"uuid": "c5dcc81e-d18a-42ea-8449-336f8c047ece", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41796", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10877", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41796\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices allows to change the login password without knowing the current password. In combination with a prepared CSRF attack (CVE-2024-41795) an unauthenticated attacker could be able to set the password to an attacker-controlled value.\n\ud83d\udccf Published: 2025-04-08T08:22:14.357Z\n\ud83d\udccf Modified: 2025-04-08T08:22:14.357Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:40.000000Z"}, {"uuid": "95562698-4703-45c0-976a-ffcd054ebdb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41797", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17908", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41797\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions &lt; V3.1), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (All versions &lt; V3.1), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (All versions &lt; V3.1), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (All versions &lt; V3.1), SCALANCE XC332 (6GK5332-0GA00-2AC2) (All versions &lt; V3.1), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (All versions &lt; V3.1), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (All versions &lt; V3.1), SCALANCE XC432 (6GK5432-0GR00-2AC2) (All versions &lt; V3.1), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions &lt; V3.1), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions &lt; V3.1), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions &lt; V3.1), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions &lt; V3.1), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (All versions &lt; V3.1), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (All versions &lt; V3.1), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (All versions &lt; V3.1), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (All versions &lt; V3.1), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (All versions &lt; V3.1), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (All versions &lt; V3.1), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (All versions &lt; V3.1), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (All versions &lt; V3.1), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (All versions &lt; V3.1), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (All versions &lt; V3.1), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (All versions &lt; V3.1), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (All versions &lt; V3.1), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (All versions &lt; V3.1), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (All versions &lt; V3.1), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (All versions &lt; V3.1), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (All versions &lt; V3.1), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (All versions &lt; V3.1), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (All versions &lt; V3.1), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (All versions &lt; V3.1), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions &lt; V3.1), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions &lt; V3.1), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions &lt; V3.1), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions &lt; V3.1), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions &lt; V3.1), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions &lt; V3.1), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions &lt; V3.1), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions &lt; V3.1), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions &lt; V3.1), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions &lt; V3.1). Affected devices contain an incorrect authorization check vulnerability. This could allow an authenticated remote attacker with \"guest\" role to invoke an internal \"do system\" command which exceeds their privileges. This command allows the execution of certain low-risk actions, the most critical of which is clearing the local system log.\n\ud83d\udccf Published: 2025-06-10T15:17:11.253Z\n\ud83d\udccf Modified: 2025-06-10T15:17:11.253Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-633269.html", "creation_timestamp": "2025-06-10T15:31:08.000000Z"}, {"uuid": "a5623720-d1da-4924-8324-eba3da250fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41794", "type": "seen", "source": "https://t.me/ics_cert/1096", "content": "\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u0648\u0644\u0641\u0647 Data Manager \u062f\u0631 \u0645\u06cc\u0627\u0646 \u0627\u0641\u0632\u0627\u0631 \u062f\u0633\u062a\u06af\u0627\u0647 \u0647\u0627\u06cc \u0686\u0646\u062f \u0645\u0646\u0638\u0648\u0631\u0647 SENTRON 7KT PAC1260 \u0632\u06cc\u0645\u0646\u0633 \u0628\u0631\u0627\u06cc \u0627\u0646\u062f\u0627\u0632\u0647 \u06af\u06cc\u0631\u06cc \u067e\u0627\u0631\u0627\u0645\u062a\u0631\u0647\u0627\u06cc \u0634\u0628\u06a9\u0647 \u0627\u0644\u06a9\u062a\u0631\u06cc\u06a9\u06cc \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u0631\u0645\u0632\u06af\u0630\u0627\u0631\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u067e\u0631\u0648\u062a\u06a9\u0644 SSH \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u063a\u06cc\u0631\u0645\u062c\u0627\u0632 \u062f\u0627\u0634\u062a\u0647 \u0628\u0627\u0634\u062f.\n\nBDU: 2025-04081\nCVE-2024-41794\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u06cc\u06a9 \u062f\u0633\u062a\u06af\u0627\u0647 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u067e\u0631\u0648\u062a\u06a9\u0644 SSH.\n- \u062a\u0642\u0633\u06cc\u0645 \u0628\u0646\u062f\u06cc \u0634\u0628\u06a9\u0647 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u06cc\u06a9 \u062f\u0633\u062a\u06af\u0627\u0647 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0627\u0632 \u0632\u06cc\u0631\u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062f\u06cc\u06af\u0631.\n- \u062a\u0644\u0627\u0634 \u0628\u0631\u0627\u06cc \u0631\u062f\u06cc\u0627\u0628\u06cc \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u067e\u0631\u0648\u062a\u06a9\u0644 SSH \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u0631\u0645\u0632\u06af\u0630\u0627\u0631\u06cc \u0634\u062f\u0647 \u0633\u062e\u062a.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627:\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-187636.pdf\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33\n\u06af\u0631\u0648\u0647 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ICSCERT_IR", "creation_timestamp": "2025-04-09T20:20:13.000000Z"}, {"uuid": "aaa8aaae-430e-48bf-be01-56ce3585f146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41794", "type": "seen", "source": "https://t.me/ics_cert/1108", "content": "\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u0648\u0644\u0641\u0647 Data Manager \u062f\u0631 \u0645\u06cc\u0627\u0646 \u0627\u0641\u0632\u0627\u0631 \u062f\u0633\u062a\u06af\u0627\u0647 \u0647\u0627\u06cc \u0686\u0646\u062f \u0645\u0646\u0638\u0648\u0631\u0647 SENTRON 7KT PAC1260 \u0632\u06cc\u0645\u0646\u0633 \u0628\u0631\u0627\u06cc \u0627\u0646\u062f\u0627\u0632\u0647 \u06af\u06cc\u0631\u06cc \u067e\u0627\u0631\u0627\u0645\u062a\u0631\u0647\u0627\u06cc \u0634\u0628\u06a9\u0647 \u0627\u0644\u06a9\u062a\u0631\u06cc\u06a9\u06cc \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u0631\u0645\u0632\u06af\u0630\u0627\u0631\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u067e\u0631\u0648\u062a\u06a9\u0644 SSH \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc \u063a\u06cc\u0631\u0645\u062c\u0627\u0632 \u062f\u0627\u0634\u062a\u0647 \u0628\u0627\u0634\u062f.\n\nBDU: 2025-04081\nCVE-2024-41794\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u06cc\u06a9 \u062f\u0633\u062a\u06af\u0627\u0647 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u067e\u0631\u0648\u062a\u06a9\u0644 SSH.\n- \u062a\u0642\u0633\u06cc\u0645 \u0628\u0646\u062f\u06cc \u0634\u0628\u06a9\u0647 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u06cc\u06a9 \u062f\u0633\u062a\u06af\u0627\u0647 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0627\u0632 \u0632\u06cc\u0631\u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062f\u06cc\u06af\u0631.\n- \u062a\u0644\u0627\u0634 \u0628\u0631\u0627\u06cc \u0631\u062f\u06cc\u0627\u0628\u06cc \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u062f\u0633\u062a\u06af\u0627\u0647 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u067e\u0631\u0648\u062a\u06a9\u0644 SSH \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647 \u0647\u0627\u06cc \u0631\u0645\u0632\u06af\u0630\u0627\u0631\u06cc \u0634\u062f\u0647 \u0633\u062e\u062a.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u062e\u0635\u0648\u0635\u06cc \u0645\u062c\u0627\u0632\u06cc \u0628\u0631\u0627\u06cc \u0633\u0627\u0632\u0645\u0627\u0646\u062f\u0647\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (VPN).\n\n\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627:\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-187636.pdf\n\ud83c\udfed \u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33\n\u06af\u0631\u0648\u0647 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ICSCERT_IR", "creation_timestamp": "2025-04-14T17:19:22.000000Z"}, {"uuid": "f8fac354-8877-4941-902b-10bc95b1ce24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41799", "type": "seen", "source": "https://t.me/cvedetector/1853", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41799 - Tgstation-Server Privilege Escalation Vulnerability (Remote Code Execution)\", \n  \"Content\": \"CVE ID : CVE-2024-41799 \nPublished : July 29, 2024, 3:15 p.m. | 35\u00a0minutes ago \nDescription : tgstation-server is a production scale tool for BYOND server management. Prior to 6.8.0, low permission users using the \"Set .dme Path\" privilege could potentially set malicious .dme files existing on the host machine to be compiled and executed. These .dme files could be uploaded via tgstation-server (requiring a separate, isolated privilege) or some other means. A server configured to execute in BYOND's trusted security level (requiring a third separate, isolated privilege OR being set by another user) could lead to this escalating into remote code execution via BYOND's shell() proc. The ability to execute this kind of attack is a known side effect of having privileged TGS users, but normally requires multiple privileges with known weaknesses. This vector is not intentional as it does not require control over the where deployment code is sourced from and _may_ not require remote write access to an instance's `Configuration` directory. This problem is fixed in versions 6.8.0 and above. \nSeverity: 8.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"29 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-29T17:57:54.000000Z"}]}