{"vulnerability": "CVE-2025-27494", "sightings": [{"uuid": "5e6e14db-3c23-4935-8c19-5cb4258f3331", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lk3uvjrpt22v", "content": "", "creation_timestamp": "2025-03-11T10:40:18.740821Z"}, {"uuid": "6449b9f5-7fe4-40f3-9158-68f400d47150", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lk56agqkll2h", "content": "", "creation_timestamp": "2025-03-11T23:00:10.106733Z"}, {"uuid": "23349c32-78bb-4b99-b69f-22c497a3268a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk3xjodn7s2c", "content": "", "creation_timestamp": "2025-03-11T11:27:24.808223Z"}, {"uuid": "6a3ead68-60a4-4cde-8bd3-f4ec90c8929d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114143639072319087", "content": "", "creation_timestamp": "2025-03-11T11:48:31.960198Z"}, {"uuid": "ad9ed0e2-1548-4570-82fc-d80912cb00d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk43e3i6ig26", "content": "", "creation_timestamp": "2025-03-11T12:35:50.318153Z"}, {"uuid": "a57e77b7-cf8a-4968-b9fe-c28a69601440", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lk4bqj3n3c2f", "content": "", "creation_timestamp": "2025-03-11T14:30:08.884208Z"}, {"uuid": "29f5a972-b45a-45aa-a5c4-713b8fb9c920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lk4kdxy3bk2f", "content": "", "creation_timestamp": "2025-03-11T17:04:14.638395Z"}, {"uuid": "4ab98871-bae2-4dc0-ae9a-bb8100d0e9d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-072-04", "content": "", "creation_timestamp": "2025-03-13T11:00:00.000000Z"}, {"uuid": "a6f070c9-2eac-45b8-bcc1-3f72fec82ae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lk6ghtifil2j", "content": "", "creation_timestamp": "2025-03-12T11:00:06.406206Z"}, {"uuid": "231d574b-cdaf-44f8-a78c-4f8e8233c3dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "https://t.me/cvedetector/20066", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27494 - SiPass Integrated Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27494 \nPublished : March 11, 2025, 10:15 a.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions &lt; V6.4.9), SiPass integrated ACC-AP (All versions &lt; V6.4.9). Affected devices improperly sanitize input for the pubkey endpoint of the REST API. This could allow an authenticated remote administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T13:26:39.000000Z"}, {"uuid": "16c08c80-3049-41ff-9985-21033492d5f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:35.000000Z"}, {"uuid": "9cef7274-d583-48f5-a757-7bcc792f922c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "https://t.me/CyberBulletin/2579", "content": "\u26a1CVE-2025-27494 (CVSS 9.1):Critical Flaw Found in Siemens SiPass Access Control Systems.\n\n#CyberBulletin", "creation_timestamp": "2025-03-11T14:13:40.000000Z"}, {"uuid": "238d7739-6f13-417a-9821-944e34f58f3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27494", "type": "seen", "source": "Telegram/BUC-F_pXySBJlIgXgQmiFYagG3wm0MhpRzVS07GXFjNvPGc", "content": "", "creation_timestamp": "2025-03-11T11:35:11.000000Z"}]}