Cyber Posture

CVE-2026-27668

High

Published: 14 April 2026

Published
14 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 13.4th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27668 is a high-severity Incorrect Privilege Assignment (CWE-266) vulnerability. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 13.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-5 (Separation of Duties).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires enforcement of approved authorizations, directly preventing User Administrators from administering their own groups and escalating privileges.

prevent

Enforces least privilege principle, blocking self-escalation by limiting User Administrators to only necessary access without ability to grant themselves higher privileges.

prevent

Implements separation of duties to prohibit a single user from both belonging to and administering the same group, mitigating the privilege escalation vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remote authenticated logic flaw (CWE-266) in a public-facing access management application that allows a low-privileged User Administrator to modify group memberships/permissions they should not control, directly enabling privilege escalation to arbitrary device groups. This maps to T1190 (remote exploitation of exposed app), T1068 (exploitation for privilege escalation), and T1098 (account/group manipulation to achieve the escalation).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability has been identified in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) (All versions < V5.8). User Administrators are allowed to administer groups they belong to. This could allow an authenticated User Administrator to escalate their own privileges and…

more

grant themselves access to any device group at any access level.

Deeper analysisAI

CVE-2026-27668, published on 2026-04-14, is a vulnerability in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P), affecting all versions prior to V5.8. The issue arises because User Administrators are permitted to administer groups they belong to, violating proper access controls (CWE-266). This flaw has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.

An attacker with low-privilege authenticated access as a User Administrator can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By leveraging the ability to self-administer their group, the attacker can escalate their own privileges, granting themselves access to any device group at any access level.

The Siemens security advisory at https://cert-portal.siemens.com/productcert/html/ssa-741509.html details the vulnerability and recommends updating to SAM-P version V5.8 or later to mitigate the issue, as all prior versions remain vulnerable.

Details

CWE(s)

Affected Products

All
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-32520Shared CWE-266
CVE-2025-44655Shared CWE-266
CVE-2026-27051Shared CWE-266
CVE-2026-23800Shared CWE-266
CVE-2026-32519Shared CWE-266
CVE-2026-32488Shared CWE-266
CVE-2026-32916Shared CWE-266
CVE-2025-68869Shared CWE-266
CVE-2024-56000Shared CWE-266
CVE-2026-23550Shared CWE-266

References