RUGGEDCOM CROSSBOW SAM-P Privilege Escalation Identified

RUGGEDCOM CROSSBOW SAM-P Privilege Escalation Identified

A critical privilege escalation vulnerability, tracked as CVE-2026-27668, has been identified in Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) across all versions prior to V5.8. According to the National Vulnerability Database, this flaw allows authenticated User Administrators to administer groups they are already a part of. This seemingly innocuous permission opens the door for a significant security bypass.

The real kicker here is that a User Administrator, leveraging this vulnerability, can elevate their own privileges. They can grant themselves access to any device group, at any access level, effectively sidestepping the intended security controls. The National Vulnerability Database has assigned this a CVSSv3 score of 8.8, classifying it as HIGH severity. The vector, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, points to a network-exploitable vulnerability requiring low privileges, with no user interaction, leading to high impacts on confidentiality, integrity, and availability. This is a classic example of CWE-266, Incorrect Privilege Assignment, and it’s a nasty one given the potential for full system compromise.

Indicators of Compromise

IDTypeIndicator
CVE-2026-27668 Privilege Escalation RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) versions prior to V5.8
CVE-2026-27668 Privilege Escalation Authenticated User Administrator can grant themselves access to any device group at any access level
🔎
Turn this CVE into SIEM detection coverage Generate detection rules for Splunk, Sentinel, QRadar & Elastic — straight from this vulnerability. Use /detect in the Intel Bot.
Open Intel Bot →

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs