Siemens SENTRON powermanager
SENTRON powermanager V3 is affected by a privilege escalation vulnerability (CWE-732) that allows a local attacker with limited user privileges to inject arbitrary code and escalate to higher privileges. The vulnerability is not remotely exploitable and requires local access to the application server. Siemens has released a security patch for SENTRON powermanager v3.6 HF1. Mitigation includes restricting local server access, enforcing least-privilege user accounts, implementing physical access controls to the application server, and following Siemens industrial security guidelines.
- Local access to the SENTRON powermanager application server
- Non-administrative user account on the server
- Ability to execute code or interact with the vulnerable application
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c009253f-69c4-48b2-a280-a4b2e843ee7eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.