A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V6.4.9), SiPass integrated ACC-AP (All versions < V6.4.9). Affected devices improperly sanitize user input for specific commands on the telnet command line interface. This could allow an authenticated local administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges.
Attack Parameters
Impact Assessment
CVSS Vector v4.0
Weakness Type (CWE)
Vulnerable Products 4
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Siemens Sipass_Integrated_Ac5102_\(Acc-G2\)_Firmware
cpe:2.3:o:siemens:sipass_integrated_ac5102_\(acc-g2\)_firmware:*:*:*:*:*:*:*:*
|
— |
6.4.9
|
|
Siemens Sipass_Integrated_Ac5102_\(Acc-G2\)
cpe:2.3:h:siemens:sipass_integrated_ac5102_\(acc-g2\):-:*:*:*:*:*:*:*
|
— | — |
|
Siemens Sipass_Integrated_Acc-Ap_Firmware
cpe:2.3:o:siemens:sipass_integrated_acc-ap_firmware:*:*:*:*:*:*:*:*
|
— |
6.4.9
|
|
Siemens Sipass_Integrated_Acc-Ap
cpe:2.3:h:siemens:sipass_integrated_acc-ap:-:*:*:*:*:*:*:*
|
— | — |