OTPulse

Multiple Vulnerabilities in SiPass integrated AC5102 / ACC-G2 and ACC-AP

Act Now9.1SSA-515903Mar 11, 2025
Attack VectorNetwork
Auth RequiredHigh
ComplexityLow
User InteractionNone needed
Summary

SiPass integrated ACC (Advanced Central Controller) devices AC5102 (ACC-G2) and ACC-AP contain multiple vulnerabilities involving insufficient input validation and missing authentication checks. These allow attackers with high-privilege engineering credentials to execute arbitrary commands with root privileges on the controllers. Siemens has released firmware updates to address these issues.

What this means
What could happen
An attacker with engineering access to the SiPass system could execute commands with root privileges on the ACC controllers, potentially changing access control settings, disabling alarms, or modifying door lock states and credential databases.
Who's at risk
Physical security operators and facilities managers using Siemens SiPass integrated access control systems with ACC-G2 or ACC-AP central controller cards. This affects organizations managing building entry systems, including corporate offices, data centers, hospitals, and municipal facilities that rely on these controllers for door locks, credential readers, and access logging.
How it could be exploited
An attacker with valid engineering or high-privilege credentials can exploit insufficient input validation and missing authentication checks to bypass security controls on the ACC-G2 or ACC-AP controllers. Once exploited, the attacker gains root-level command execution on the device, allowing modification of access control policies and physical security settings.
Prerequisites
  • Valid high-privilege engineering credentials for the SiPass integrated system
  • Network access to the ACC controller management interface
  • Knowledge of the SiPass system administration interface
High-privilege credentials required for exploitationRequires network access to management interfaceAffects physical access control and security logsRoot-level code execution possibleNo active exploitation reported (low EPSS)
Exploitability
Low exploit probability (EPSS 0.3%)
Affected products (4)
4 with fix
ProductAffected VersionsFix Status
SiPass integrated AC5102 (ACC-G2)< V6.4.86.4.8
SiPass integrated AC5102 (ACC-G2)< V6.4.96.4.9
SiPass integrated ACC-AP< V6.4.86.4.8
SiPass integrated ACC-AP< V6.4.96.4.9
Remediation & Mitigation
0/4
Do now
0/2
HARDENINGRestrict administrative access to the ACC controllers to authorized engineering personnel only and use strong, unique credentials
HARDENINGMonitor ACC controller logs for suspicious administrative activity or command execution
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

SiPass integrated AC5102 (ACC-G2)
HOTFIXUpdate SiPass integrated AC5102 (ACC-G2) to firmware version 6.4.8 or later
SiPass integrated ACC-AP
HOTFIXUpdate SiPass integrated ACC-AP to firmware version 6.4.8 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/571791e4-9f31-40aa-8639-34fe4a28a239
Multiple Vulnerabilities in SiPass integrated AC5102 / ACC-G2 and ACC-AP | CVSS 9.1 - OTPulse