{"vulnerability": "CVE-2024-41793", "sightings": [{"uuid": "d16597b2-c9fc-447a-bd2f-72191da6333a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114302183063361300", "content": "", "creation_timestamp": "2025-04-08T11:48:21.860061Z"}, {"uuid": "d6d443cc-f579-4354-8c0c-d7f122e2d06c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmcgsorjtk2q", "content": "", "creation_timestamp": "2025-04-08T12:07:15.413337Z"}, {"uuid": "1188b743-40d2-4990-9326-8d8d4a088beb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114308178260624821", "content": "", "creation_timestamp": "2025-04-09T13:13:00.923229Z"}, {"uuid": "256967c9-be99-4e2a-b42c-6abff585e04e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-06", "content": "", "creation_timestamp": "2025-04-10T10:00:00.000000Z"}, {"uuid": "04750e33-97a5-42ad-a9a6-07955c3ac4ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10880", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41793\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices provides an endpoint that allows to enable the ssh service without authentication. This could allow an unauthenticated remote attacker to enable remote access to the device via ssh.\n\ud83d\udccf Published: 2025-04-08T08:22:09.907Z\n\ud83d\udccf Modified: 2025-04-08T08:22:09.907Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:43.000000Z"}, {"uuid": "37c215fe-559c-4919-9f13-b040f6627fe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10879", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41794\n\ud83d\udd25 CVSS Score: 10 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793).\n\ud83d\udccf Published: 2025-04-08T08:22:11.279Z\n\ud83d\udccf Modified: 2025-04-08T08:22:11.279Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:42.000000Z"}]}