Siemens SENTRON 7KT PAC1260 Data Manager
SENTRON 7KT PAC1260 Data Manager is affected by multiple critical vulnerabilities including OS command injection (CWE-78), missing authentication (CWE-306), path traversal (CWE-22), hardcoded credentials (CWE-798), and cross-site request forgery (CWE-352). These vulnerabilities can be exploited by unauthenticated attackers over the network to gain full command execution on the device. Siemens has declared the product end-of-life and will not release patches. The vendor recommends replacing the device with SENTRON 7KT PAC1261 and updating to the latest firmware version.
- Network reachability to the SENTRON 7KT PAC1260 on TCP ports 80 and/or 443
- No authentication required - vulnerabilities are pre-authentication
Patching may require device reboot — plan for process interruption
/api/v1/advisories/38a4eab5-7f3f-4932-9796-a4ca97203e17Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.