Логотип exploitDog
bind:CVE-2024-41794
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-41794

Количество 3

Количество 3

nvd логотип

CVE-2024-41794

10 месяцев назад

A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793).

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-w4wq-mmwq-2c74

10 месяцев назад

A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793).

CVSS3: 10
EPSS: Низкий
fstec логотип

BDU:2025-04081

10 месяцев назад

Уязвимость компонента Data Manager микропрограммного обеспечения многофункциональных приборов измерения параметров электрических сетей Siemens SENTRON 7KT PAC1260, позволяющая нарушителю получить несанкционированный доступ к устройству

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-41794

A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793).

CVSS3: 10
0%
Низкий
10 месяцев назад
github логотип
GHSA-w4wq-mmwq-2c74

A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). Affected devices contain hardcoded credentials for remote access to the device operating system with root privileges. This could allow unauthenticated remote attackers to gain full access to a device, if they are in possession of these credentials and if the ssh service is enabled (e.g., by exploitation of CVE-2024-41793).

CVSS3: 10
0%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-04081

Уязвимость компонента Data Manager микропрограммного обеспечения многофункциональных приборов измерения параметров электрических сетей Siemens SENTRON 7KT PAC1260, позволяющая нарушителю получить несанкционированный доступ к устройству

CVSS3: 10
0%
Низкий
10 месяцев назад

Уязвимостей на страницу