Siemens SiPass integrated AC5102/ACC-G2 and ACC-AP
SiPass integrated ACC (Advanced Central Controller) devices contain multiple vulnerabilities in authentication and input validation (CWE-306, CWE-20) that could allow attackers with high-level network access to execute arbitrary commands with root privileges and access sensitive data. Affected versions: SiPass integrated AC5102 (ACC-G2) and SiPass integrated ACC-AP firmware versions below 6.4.8 and 6.4.9. Vulnerabilities include CVE-2024-52285 (command execution), CVE-2025-27493 (authentication bypass), and CVE-2025-27494 (weak authentication). Siemens has released patched versions 6.4.8 and 6.4.9 addressing these issues.
- Network connectivity to the SiPass ACC device on its management port
- High-privilege account credentials (administrator-level access or ability to set the 'SIEMENS' account password)
- Knowledge of the ACC device network address and accessible administrative interface
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c4f32fe8-6dd1-48d2-a200-14dc6232216eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.