CVE-2025-27494
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V6.4.9), SiPass integrated ACC-AP (All versions < V6.4.9). Affected devices improperly sanitize input for the pubkey endpoint of the REST API. This could allow an authenticated remote administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges.
Analysis
Siemens SiPass integrated access control systems (AC5102 ACC-G2 and ACC-AP, before V6.4.9) allow authenticated administrators to escalate to root via command injection in the REST API's pubkey endpoint. While high privileges are required, the scope change enables full system compromise.
Technical Context
The pubkey endpoint of the REST API fails to sanitize administrator-supplied input before passing it to a system command (CWE-20). An authenticated administrator can inject OS commands that execute with root privileges, escalating beyond their intended access level.
Affected Products
SiPass integrated AC5102 (ACC-G2) < V6.4.9, SiPass integrated ACC-AP < V6.4.9
Remediation
Update to SiPass integrated V6.4.9 or later. Restrict admin API access to trusted networks. Audit admin account usage and implement MFA for admin access.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today