Ad

CVE-2025-27494

CRITICAL CVSS 4.0: 9.4 EPSS 0.24%
Updated Aug 22, 2025
Siemens
Parameter Value
CVSS 9.4 (CRITICAL)
Affected Versions before 6.4.9
Fixed In 6.4.9
Type CWE-20 (Improper Input Validation)
Vendor Siemens
Public PoC No

A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V6.4.9), SiPass integrated ACC-AP (All versions < V6.4.9). Affected devices improperly sanitize input for the pubkey endpoint of the REST API. This could allow an authenticated remote administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
High
Admin privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v4.0

Vulnerable Products 4

Configuration From (including) Up to (excluding)
Siemens Sipass_Integrated_Ac5102_\(Acc-G2\)_Firmware
cpe:2.3:o:siemens:sipass_integrated_ac5102_\(acc-g2\)_firmware:*:*:*:*:*:*:*:*
6.4.9
Siemens Sipass_Integrated_Ac5102_\(Acc-G2\)
cpe:2.3:h:siemens:sipass_integrated_ac5102_\(acc-g2\):-:*:*:*:*:*:*:*
Siemens Sipass_Integrated_Acc-Ap_Firmware
cpe:2.3:o:siemens:sipass_integrated_acc-ap_firmware:*:*:*:*:*:*:*:*
6.4.9
Siemens Sipass_Integrated_Acc-Ap
cpe:2.3:h:siemens:sipass_integrated_acc-ap:-:*:*:*:*:*:*:*