Privilege Escalation Vulnerability in RUGGEDCOM CROSSBOW Secure Access Manager Primary Before V5.8

Plan PatchCVSS 8.8SSA-741509Apr 14, 2026
Siemens
Attack path
Attack VectorNetwork
Auth RequiredLow
ComplexityLow
User InteractionNone needed
Summary

RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) versions before 5.8 contain a privilege escalation vulnerability (CWE-266) that allows an authenticated user to escalate their privileges. An attacker with valid credentials can gain elevated access without additional authentication, potentially achieving administrative control over the access management system and all devices it protects.

What this means
What could happen
An attacker with valid login credentials to the Secure Access Manager could escalate their privileges, potentially gaining administrative control over the device and all systems it manages. This could allow them to modify user accounts, access credentials, or alter access policies for critical infrastructure components.
Who's at risk
Industrial network access control administrators and operators who manage RUGGEDCOM CROSSBOW Secure Access Manager deployments in utilities, manufacturing plants, and critical infrastructure. This affects any organization using SAM-P to control access to Siemens RUGGEDCOM devices or other managed industrial network equipment.
How it could be exploited
An attacker with valid credentials logs into the SAM-P web interface or management portal. Once authenticated as a standard user, they exploit the privilege escalation flaw to gain administrative or higher-level privileges without additional authentication. With escalated privileges, they can modify system configurations and access controls across managed infrastructure.
Prerequisites
  • Valid user credentials for SAM-P login
  • Network access to SAM-P management interface (default port 443 HTTPS or management port)
  • Account with at least basic user privileges
remotely exploitablerequires valid credentialsaffects access control systemshigh CVSS score (8.8)
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (1)
ProductAffected VersionsFix Status
RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P)< 5.85.8
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate RUGGEDCOM CROSSBOW Secure Access Manager Primary to version 5.8 or later
API: /api/v1/advisories/aa7cfc04-ee05-456f-9468-dff7024ead3a

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.

Privilege Escalation Vulnerability in RUGGEDCOM CROSSBOW Secure Access Manager Primary Before V5.8 | CVSS 8.8 - OTPulse