CVE-2026-27668
Published: 14 April 2026
Summary
CVE-2026-27668 is a high-severity Incorrect Privilege Assignment (CWE-266) vulnerability. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 13.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-5 (Separation of Duties).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires enforcement of approved authorizations, directly preventing User Administrators from administering their own groups and escalating privileges.
Enforces least privilege principle, blocking self-escalation by limiting User Administrators to only necessary access without ability to grant themselves higher privileges.
Implements separation of duties to prohibit a single user from both belonging to and administering the same group, mitigating the privilege escalation vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a remote authenticated logic flaw (CWE-266) in a public-facing access management application that allows a low-privileged User Administrator to modify group memberships/permissions they should not control, directly enabling privilege escalation to arbitrary device groups. This maps to T1190 (remote exploitation of exposed app), T1068 (exploitation for privilege escalation), and T1098 (account/group manipulation to achieve the escalation).
NVD Description
A vulnerability has been identified in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) (All versions < V5.8). User Administrators are allowed to administer groups they belong to. This could allow an authenticated User Administrator to escalate their own privileges and…
more
grant themselves access to any device group at any access level.
Deeper analysisAI
CVE-2026-27668, published on 2026-04-14, is a vulnerability in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P), affecting all versions prior to V5.8. The issue arises because User Administrators are permitted to administer groups they belong to, violating proper access controls (CWE-266). This flaw has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.
An attacker with low-privilege authenticated access as a User Administrator can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By leveraging the ability to self-administer their group, the attacker can escalate their own privileges, granting themselves access to any device group at any access level.
The Siemens security advisory at https://cert-portal.siemens.com/productcert/html/ssa-741509.html details the vulnerability and recommends updating to SAM-P version V5.8 or later to mitigate the issue, as all prior versions remain vulnerable.
Details
- CWE(s)