CVE-2025-27494

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated remote administrators on SiPass integrated access control systems to escalate privileges by injecting arbitrary commands through the pubkey endpoint of the REST API. The injected commands execute with root privileges, enabling complete system compromise. Affected systems include SiPass integrated AC5102 (ACC-G2) and SiPass integrated ACC-AP devices running versions below V6.4.9.

💻 Affected Systems

Products:
  • SiPass integrated AC5102 (ACC-G2)
  • SiPass integrated ACC-AP
Versions: All versions < V6.4.9
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrator access to exploit. Affects REST API endpoint handling public key operations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root access, allowing attacker to disable security systems, steal credentials, install persistent backdoors, or pivot to other network segments.

🟠

Likely Case

Privilege escalation from authenticated administrator to root, enabling modification of access control rules, user databases, and system configurations.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege access controls prevent authenticated attackers from reaching vulnerable endpoints.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrator credentials but involves simple command injection through improper input sanitization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V6.4.9

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-515903.html

Restart Required: Yes

Instructions:

1. Download V6.4.9 firmware from Siemens support portal. 2. Backup current configuration. 3. Apply firmware update through web interface or console. 4. Reboot device. 5. Verify version shows V6.4.9 or higher.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate SiPass devices from general network and restrict access to management interfaces.

Access Control Restrictions

all

Limit administrator accounts and implement strong authentication with MFA where possible.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which IP addresses can reach the REST API management interface.
  • Monitor and audit all administrator account activity, especially API calls to pubkey endpoints.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version through web interface or console. If version is below V6.4.9, device is vulnerable.

Check Version:

Check via web interface at System > About or via console using system info commands specific to device model.

Verify Fix Applied:

After patching, confirm firmware version shows V6.4.9 or higher and test that command injection attempts are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API calls to /api/pubkey endpoints
  • Multiple failed authentication attempts followed by successful admin login
  • Commands with shell metacharacters in pubkey parameter values

Network Indicators:

  • Unusual outbound connections from SiPass devices
  • Traffic to pubkey endpoints with suspicious payloads

SIEM Query:

source="sipass" AND (uri_path="/api/pubkey" OR uri_path CONTAINS "pubkey") AND (http_method="POST" OR http_method="PUT")

🔗 References

📤 Share & Export