Impact
The flaw permits a User Administrator with valid credentials to alter group memberships for any device group, effectively granting themselves full access to devices at any authorization level. This improper authorization defect enables an authenticated internal user to elevate privileges beyond what their role permits, potentially exposing confidential device data and control interfaces.
Affected Systems
Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM‑P) is affected; all releases older than version 5.8 contain the vulnerability.
Risk and Exploitability
The CVSS base score of 8.7 classifies this as a high‑severity vulnerability. No EPSS data is available and the flaw is not listed in the CISA KEV catalog. Attackers must possess a User Administrator account; once authenticated, exploitation is straightforward and requires no additional steps beyond modifying group assignments.
OpenCVE Enrichment