{"uuid": "04750e33-97a5-42ad-a9a6-07955c3ac4ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-41793", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10880", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-41793\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in SENTRON 7KT PAC1260 Data Manager (All versions). The web interface of affected devices provides an endpoint that allows to enable the ssh service without authentication. This could allow an unauthenticated remote attacker to enable remote access to the device via ssh.\n\ud83d\udccf Published: 2025-04-08T08:22:09.907Z\n\ud83d\udccf Modified: 2025-04-08T08:22:09.907Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-187636.html", "creation_timestamp": "2025-04-08T08:46:43.000000Z"}