Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-41224 (GCVE-0-2025-41224)
Vulnerability from cvelistv5 – Published: 2025-07-08 10:35 – Updated: 2025-07-08 20:31- CWE-693 - Protection Mechanism Failure
| Vendor | Product | Version | |
|---|---|---|---|
| Siemens | RUGGEDCOM RMC8388 V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RMC8388NC V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RS416NCv2 V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RS416PNCv2 V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RS416Pv2 V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RS416v2 V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RS900 (32M) V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RS900G (32M) V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RS900GNC(32M) V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RS900NC(32M) V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2100 (32M) V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2100NC(32M) V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2100P (32M) V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2100PNC (32M) V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2288 V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2288NC V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2300 V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2300NC V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2300P V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2300PNC V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2488 V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG2488NC V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG907R |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG908C |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG909R |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG910C |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG920P V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSG920PNC V5.X |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSL910 |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RSL910NC |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RST2228 |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RST2228P |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RST916C |
Affected:
0 , < V5.10.0
(custom)
|
|
| Siemens | RUGGEDCOM RST916P |
Affected:
0 , < V5.10.0
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-41224",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-08T20:31:21.314188Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-08T20:31:27.395Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RMC8388 V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RMC8388NC V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RS416NCv2 V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RS416PNCv2 V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RS416Pv2 V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RS416v2 V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RS900 (32M) V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RS900G (32M) V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RS900GNC(32M) V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RS900NC(32M) V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2100 (32M) V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2100NC(32M) V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2100P (32M) V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2100PNC (32M) V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2288 V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2288NC V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2300 V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2300NC V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2300P V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2300PNC V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2488 V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG2488NC V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG907R",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG908C",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG909R",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG910C",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG920P V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSG920PNC V5.X",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSL910",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RSL910NC",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RST2228",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RST2228P",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RST916C",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unknown",
"product": "RUGGEDCOM RST916P",
"vendor": "Siemens",
"versions": [
{
"lessThan": "V5.10.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RMC8388NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416NCv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416Pv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416v2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900 (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900G (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2288 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2288NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300P V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300PNC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2488 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2488NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG907R (All versions \u003c V5.10.0), RUGGEDCOM RSG908C (All versions \u003c V5.10.0), RUGGEDCOM RSG909R (All versions \u003c V5.10.0), RUGGEDCOM RSG910C (All versions \u003c V5.10.0), RUGGEDCOM RSG920P V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG920PNC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSL910 (All versions \u003c V5.10.0), RUGGEDCOM RSL910NC (All versions \u003c V5.10.0), RUGGEDCOM RST2228 (All versions \u003c V5.10.0), RUGGEDCOM RST2228P (All versions \u003c V5.10.0), RUGGEDCOM RST916C (All versions \u003c V5.10.0), RUGGEDCOM RST916P (All versions \u003c V5.10.0). The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"cvssV4_0": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-693",
"description": "CWE-693: Protection Mechanism Failure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-08T10:35:09.492Z",
"orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"shortName": "siemens"
},
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-083019.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
"assignerShortName": "siemens",
"cveId": "CVE-2025-41224",
"datePublished": "2025-07-08T10:35:09.492Z",
"dateReserved": "2025-04-16T09:27:14.282Z",
"dateUpdated": "2025-07-08T20:31:27.395Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-41224",
"date": "2026-05-15",
"epss": "0.00148",
"percentile": "0.34884"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-41224\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2025-07-08T11:15:31.527\",\"lastModified\":\"2025-07-08T16:18:14.207\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RMC8388NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416NCv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416Pv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416v2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900 (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900G (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2288 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2288NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300P V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300PNC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2488 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2488NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG907R (All versions \u003c V5.10.0), RUGGEDCOM RSG908C (All versions \u003c V5.10.0), RUGGEDCOM RSG909R (All versions \u003c V5.10.0), RUGGEDCOM RSG910C (All versions \u003c V5.10.0), RUGGEDCOM RSG920P V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG920PNC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSL910 (All versions \u003c V5.10.0), RUGGEDCOM RSL910NC (All versions \u003c V5.10.0), RUGGEDCOM RST2228 (All versions \u003c V5.10.0), RUGGEDCOM RST2228P (All versions \u003c V5.10.0), RUGGEDCOM RST916C (All versions \u003c V5.10.0), RUGGEDCOM RST916P (All versions \u003c V5.10.0). The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot.\"},{\"lang\":\"es\",\"value\":\"Se ha identificado una vulnerabilidad en RUGGEDCOM RMC8388 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RMC8388NC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS416NCv2 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS416Pv2 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS416v2 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS900 (32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS900G (32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2288 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2288NC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2300 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2300NC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2300P V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2300PNC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2488 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2488NC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG907R (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG908C (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG909R (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG910C (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG920P V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG920PNC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSL910 (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSL910NC (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RST2228 (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RST2228P (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RST916C (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RST916P (Todas las versiones \u0026lt; V5.10.0). Los productos afectados no aplican correctamente las restricciones de acceso a la interfaz al cambiar de una configuraci\u00f3n de interfaz de administraci\u00f3n a una de no administraci\u00f3n hasta que se reinicia el sistema, a pesar de que la configuraci\u00f3n se haya guardado. Esto podr\u00eda permitir que un atacante con acceso a la red y credenciales acceda al dispositivo a trav\u00e9s de una configuraci\u00f3n de no administraci\u00f3n y mantenga el acceso SSH hasta el reinicio.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-693\"}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-083019.html\",\"source\":\"productcert@siemens.com\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"cec7a2ec-15b4-4faf-bd53-b40f371f3a77\", \"shortName\": \"siemens\", \"dateUpdated\": \"2025-07-08T10:35:09.492Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RMC8388NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416NCv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416Pv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416v2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900 (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900G (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2288 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2288NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300P V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300PNC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2488 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2488NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG907R (All versions \u003c V5.10.0), RUGGEDCOM RSG908C (All versions \u003c V5.10.0), RUGGEDCOM RSG909R (All versions \u003c V5.10.0), RUGGEDCOM RSG910C (All versions \u003c V5.10.0), RUGGEDCOM RSG920P V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG920PNC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSL910 (All versions \u003c V5.10.0), RUGGEDCOM RSL910NC (All versions \u003c V5.10.0), RUGGEDCOM RST2228 (All versions \u003c V5.10.0), RUGGEDCOM RST2228P (All versions \u003c V5.10.0), RUGGEDCOM RST916C (All versions \u003c V5.10.0), RUGGEDCOM RST916P (All versions \u003c V5.10.0). The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot.\"}], \"affected\": [{\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RMC8388 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RMC8388NC V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS416NCv2 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS416PNCv2 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS416Pv2 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS416v2 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS900 (32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS900G (32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS900GNC(32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS900NC(32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2100 (32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2100NC(32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2100P (32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2100PNC (32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2288 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2288NC V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2300 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2300NC V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2300P V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2300PNC V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2488 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2488NC V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG907R\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG908C\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG909R\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG910C\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG920P V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG920PNC V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSL910\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSL910NC\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RST2228\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RST2228P\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RST916C\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RST916P\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\"}}, {\"cvssV4_0\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\", \"baseScore\": 7.7, \"baseSeverity\": \"HIGH\"}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"cweId\": \"CWE-693\", \"description\": \"CWE-693: Protection Mechanism Failure\", \"type\": \"CWE\"}]}], \"references\": [{\"url\": \"https://cert-portal.siemens.com/productcert/html/ssa-083019.html\"}]}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-41224\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-08T20:31:21.314188Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-08T20:31:24.616Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2025-41224\", \"assignerOrgId\": \"cec7a2ec-15b4-4faf-bd53-b40f371f3a77\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"siemens\", \"dateReserved\": \"2025-04-16T09:27:14.282Z\", \"datePublished\": \"2025-07-08T10:35:09.492Z\", \"dateUpdated\": \"2025-07-08T20:31:27.395Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
ICSA-25-294-04
Vulnerability from csaf_cisa - Published: 2025-07-08 00:00 - Updated: 2025-10-14 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM i800
Siemens / RUGGEDCOM i800
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i801
Siemens / RUGGEDCOM i801
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i802
Siemens / RUGGEDCOM i802
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i803
Siemens / RUGGEDCOM i803
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M2100
Siemens / RUGGEDCOM M2100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M2200
Siemens / RUGGEDCOM M2200
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M969
Siemens / RUGGEDCOM M969
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC30
Siemens / RUGGEDCOM RMC30
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V4.X
Siemens / RUGGEDCOM RMC8388 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V5.X
Siemens / RUGGEDCOM RMC8388 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RP110
Siemens / RUGGEDCOM RP110
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600
Siemens / RUGGEDCOM RS1600
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600F
Siemens / RUGGEDCOM RS1600F
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600T
Siemens / RUGGEDCOM RS1600T
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS400
Siemens / RUGGEDCOM RS400
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS401
Siemens / RUGGEDCOM RS401
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416
Siemens / RUGGEDCOM RS416
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416P
Siemens / RUGGEDCOM RS416P
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V4.X
Siemens / RUGGEDCOM RS416Pv2 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V5.X
Siemens / RUGGEDCOM RS416Pv2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416v2 V4.X
Siemens / RUGGEDCOM RS416v2 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416v2 V5.X
Siemens / RUGGEDCOM RS416v2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS8000
Siemens / RUGGEDCOM RS8000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000A
Siemens / RUGGEDCOM RS8000A
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000H
Siemens / RUGGEDCOM RS8000H
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000T
Siemens / RUGGEDCOM RS8000T
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900
Siemens / RUGGEDCOM RS900
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V4.X
Siemens / RUGGEDCOM RS900 (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V5.X
Siemens / RUGGEDCOM RS900 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900G
Siemens / RUGGEDCOM RS900G
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V4.X
Siemens / RUGGEDCOM RS900G (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V5.X
Siemens / RUGGEDCOM RS900G (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900GP
Siemens / RUGGEDCOM RS900GP
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900L
Siemens / RUGGEDCOM RS900L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-C01
Siemens / RUGGEDCOM RS900M-GETS-C01
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-XX
Siemens / RUGGEDCOM RS900M-GETS-XX
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-C01
Siemens / RUGGEDCOM RS900M-STND-C01
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-XX
Siemens / RUGGEDCOM RS900M-STND-XX
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900W
Siemens / RUGGEDCOM RS900W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910
Siemens / RUGGEDCOM RS910
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910L
Siemens / RUGGEDCOM RS910L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910W
Siemens / RUGGEDCOM RS910W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS920L
Siemens / RUGGEDCOM RS920L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS920W
Siemens / RUGGEDCOM RS920W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS930L
Siemens / RUGGEDCOM RS930L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS930W
Siemens / RUGGEDCOM RS930W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS940G
Siemens / RUGGEDCOM RS940G
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS969
Siemens / RUGGEDCOM RS969
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100
Siemens / RUGGEDCOM RSG2100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V4.X
Siemens / RUGGEDCOM RSG2100 (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V5.X
Siemens / RUGGEDCOM RSG2100 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100P
Siemens / RUGGEDCOM RSG2100P
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V4.X
Siemens / RUGGEDCOM RSG2100P (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V5.X
Siemens / RUGGEDCOM RSG2100P (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2200
Siemens / RUGGEDCOM RSG2200
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V4.X
Siemens / RUGGEDCOM RSG2288 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V5.X
Siemens / RUGGEDCOM RSG2288 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300 V4.X
Siemens / RUGGEDCOM RSG2300 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300 V5.X
Siemens / RUGGEDCOM RSG2300 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300P V4.X
Siemens / RUGGEDCOM RSG2300P V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300P V5.X
Siemens / RUGGEDCOM RSG2300P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2488 V4.X
Siemens / RUGGEDCOM RSG2488 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2488 V5.X
Siemens / RUGGEDCOM RSG2488 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG907R
Siemens / RUGGEDCOM RSG907R
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG908C
Siemens / RUGGEDCOM RSG908C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG909R
Siemens / RUGGEDCOM RSG909R
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG910C
Siemens / RUGGEDCOM RSG910C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG920P V4.X
Siemens / RUGGEDCOM RSG920P V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG920P V5.X
Siemens / RUGGEDCOM RSG920P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSL910
Siemens / RUGGEDCOM RSL910
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228
Siemens / RUGGEDCOM RST2228
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228P
Siemens / RUGGEDCOM RST2228P
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916C
Siemens / RUGGEDCOM RST916C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916P
Siemens / RUGGEDCOM RST916P
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM ROS V4.X NC products
Siemens / RUGGEDCOM ROS V4.X NC products
|
vers:all/* | ||
|
RUGGEDCOM ROS V5.X NC products
Siemens / RUGGEDCOM ROS V5.X NC products
|
vers:all/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM i800
Siemens / RUGGEDCOM i800
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i801
Siemens / RUGGEDCOM i801
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i802
Siemens / RUGGEDCOM i802
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i803
Siemens / RUGGEDCOM i803
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M2100
Siemens / RUGGEDCOM M2100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M2200
Siemens / RUGGEDCOM M2200
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M969
Siemens / RUGGEDCOM M969
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC30
Siemens / RUGGEDCOM RMC30
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V4.X
Siemens / RUGGEDCOM RMC8388 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V5.X
Siemens / RUGGEDCOM RMC8388 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RP110
Siemens / RUGGEDCOM RP110
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600
Siemens / RUGGEDCOM RS1600
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600F
Siemens / RUGGEDCOM RS1600F
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600T
Siemens / RUGGEDCOM RS1600T
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS400
Siemens / RUGGEDCOM RS400
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS401
Siemens / RUGGEDCOM RS401
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416
Siemens / RUGGEDCOM RS416
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416P
Siemens / RUGGEDCOM RS416P
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V4.X
Siemens / RUGGEDCOM RS416Pv2 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V5.X
Siemens / RUGGEDCOM RS416Pv2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416v2 V4.X
Siemens / RUGGEDCOM RS416v2 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416v2 V5.X
Siemens / RUGGEDCOM RS416v2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS8000
Siemens / RUGGEDCOM RS8000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000A
Siemens / RUGGEDCOM RS8000A
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000H
Siemens / RUGGEDCOM RS8000H
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000T
Siemens / RUGGEDCOM RS8000T
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900
Siemens / RUGGEDCOM RS900
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V4.X
Siemens / RUGGEDCOM RS900 (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V5.X
Siemens / RUGGEDCOM RS900 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900G
Siemens / RUGGEDCOM RS900G
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V4.X
Siemens / RUGGEDCOM RS900G (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V5.X
Siemens / RUGGEDCOM RS900G (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900GP
Siemens / RUGGEDCOM RS900GP
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900L
Siemens / RUGGEDCOM RS900L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-C01
Siemens / RUGGEDCOM RS900M-GETS-C01
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-XX
Siemens / RUGGEDCOM RS900M-GETS-XX
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-C01
Siemens / RUGGEDCOM RS900M-STND-C01
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-XX
Siemens / RUGGEDCOM RS900M-STND-XX
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900W
Siemens / RUGGEDCOM RS900W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910
Siemens / RUGGEDCOM RS910
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910L
Siemens / RUGGEDCOM RS910L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910W
Siemens / RUGGEDCOM RS910W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS920L
Siemens / RUGGEDCOM RS920L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS920W
Siemens / RUGGEDCOM RS920W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS930L
Siemens / RUGGEDCOM RS930L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS930W
Siemens / RUGGEDCOM RS930W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS940G
Siemens / RUGGEDCOM RS940G
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS969
Siemens / RUGGEDCOM RS969
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100
Siemens / RUGGEDCOM RSG2100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V4.X
Siemens / RUGGEDCOM RSG2100 (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V5.X
Siemens / RUGGEDCOM RSG2100 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100P
Siemens / RUGGEDCOM RSG2100P
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V4.X
Siemens / RUGGEDCOM RSG2100P (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V5.X
Siemens / RUGGEDCOM RSG2100P (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2200
Siemens / RUGGEDCOM RSG2200
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V4.X
Siemens / RUGGEDCOM RSG2288 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V5.X
Siemens / RUGGEDCOM RSG2288 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300 V4.X
Siemens / RUGGEDCOM RSG2300 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300 V5.X
Siemens / RUGGEDCOM RSG2300 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300P V4.X
Siemens / RUGGEDCOM RSG2300P V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300P V5.X
Siemens / RUGGEDCOM RSG2300P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2488 V4.X
Siemens / RUGGEDCOM RSG2488 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2488 V5.X
Siemens / RUGGEDCOM RSG2488 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG907R
Siemens / RUGGEDCOM RSG907R
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG908C
Siemens / RUGGEDCOM RSG908C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG909R
Siemens / RUGGEDCOM RSG909R
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG910C
Siemens / RUGGEDCOM RSG910C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG920P V4.X
Siemens / RUGGEDCOM RSG920P V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG920P V5.X
Siemens / RUGGEDCOM RSG920P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSL910
Siemens / RUGGEDCOM RSL910
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228
Siemens / RUGGEDCOM RST2228
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228P
Siemens / RUGGEDCOM RST2228P
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916C
Siemens / RUGGEDCOM RST916C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916P
Siemens / RUGGEDCOM RST916P
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM ROS V4.X NC products
Siemens / RUGGEDCOM ROS V4.X NC products
|
vers:all/* | ||
|
RUGGEDCOM ROS V5.X NC products
Siemens / RUGGEDCOM ROS V5.X NC products
|
vers:all/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM i800
Siemens / RUGGEDCOM i800
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM i801
Siemens / RUGGEDCOM i801
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM i802
Siemens / RUGGEDCOM i802
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM i803
Siemens / RUGGEDCOM i803
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM M2100
Siemens / RUGGEDCOM M2100
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM M2200
Siemens / RUGGEDCOM M2200
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM M969
Siemens / RUGGEDCOM M969
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RMC30
Siemens / RUGGEDCOM RMC30
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V4.X
Siemens / RUGGEDCOM RMC8388 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V5.X
Siemens / RUGGEDCOM RMC8388 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RP110
Siemens / RUGGEDCOM RP110
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600
Siemens / RUGGEDCOM RS1600
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600F
Siemens / RUGGEDCOM RS1600F
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600T
Siemens / RUGGEDCOM RS1600T
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS400
Siemens / RUGGEDCOM RS400
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS401
Siemens / RUGGEDCOM RS401
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS416
Siemens / RUGGEDCOM RS416
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS416P
Siemens / RUGGEDCOM RS416P
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V4.X
Siemens / RUGGEDCOM RS416Pv2 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V5.X
Siemens / RUGGEDCOM RS416Pv2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416v2 V4.X
Siemens / RUGGEDCOM RS416v2 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS416v2 V5.X
Siemens / RUGGEDCOM RS416v2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS8000
Siemens / RUGGEDCOM RS8000
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000A
Siemens / RUGGEDCOM RS8000A
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000H
Siemens / RUGGEDCOM RS8000H
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000T
Siemens / RUGGEDCOM RS8000T
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900
Siemens / RUGGEDCOM RS900
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V4.X
Siemens / RUGGEDCOM RS900 (32M) V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V5.X
Siemens / RUGGEDCOM RS900 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900G
Siemens / RUGGEDCOM RS900G
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V4.X
Siemens / RUGGEDCOM RS900G (32M) V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V5.X
Siemens / RUGGEDCOM RS900G (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900GP
Siemens / RUGGEDCOM RS900GP
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900L
Siemens / RUGGEDCOM RS900L
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-C01
Siemens / RUGGEDCOM RS900M-GETS-C01
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-XX
Siemens / RUGGEDCOM RS900M-GETS-XX
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-C01
Siemens / RUGGEDCOM RS900M-STND-C01
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-XX
Siemens / RUGGEDCOM RS900M-STND-XX
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900W
Siemens / RUGGEDCOM RS900W
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS910
Siemens / RUGGEDCOM RS910
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS910L
Siemens / RUGGEDCOM RS910L
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS910W
Siemens / RUGGEDCOM RS910W
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS920L
Siemens / RUGGEDCOM RS920L
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS920W
Siemens / RUGGEDCOM RS920W
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS930L
Siemens / RUGGEDCOM RS930L
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS930W
Siemens / RUGGEDCOM RS930W
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS940G
Siemens / RUGGEDCOM RS940G
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS969
Siemens / RUGGEDCOM RS969
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100
Siemens / RUGGEDCOM RSG2100
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V4.X
Siemens / RUGGEDCOM RSG2100 (32M) V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V5.X
Siemens / RUGGEDCOM RSG2100 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100P
Siemens / RUGGEDCOM RSG2100P
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V4.X
Siemens / RUGGEDCOM RSG2100P (32M) V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V5.X
Siemens / RUGGEDCOM RSG2100P (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2200
Siemens / RUGGEDCOM RSG2200
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V4.X
Siemens / RUGGEDCOM RSG2288 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V5.X
Siemens / RUGGEDCOM RSG2288 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300 V4.X
Siemens / RUGGEDCOM RSG2300 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300 V5.X
Siemens / RUGGEDCOM RSG2300 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300P V4.X
Siemens / RUGGEDCOM RSG2300P V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300P V5.X
Siemens / RUGGEDCOM RSG2300P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2488 V4.X
Siemens / RUGGEDCOM RSG2488 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2488 V5.X
Siemens / RUGGEDCOM RSG2488 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG907R
Siemens / RUGGEDCOM RSG907R
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG908C
Siemens / RUGGEDCOM RSG908C
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG909R
Siemens / RUGGEDCOM RSG909R
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG910C
Siemens / RUGGEDCOM RSG910C
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG920P V4.X
Siemens / RUGGEDCOM RSG920P V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG920P V5.X
Siemens / RUGGEDCOM RSG920P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSL910
Siemens / RUGGEDCOM RSL910
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228
Siemens / RUGGEDCOM RST2228
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228P
Siemens / RUGGEDCOM RST2228P
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916C
Siemens / RUGGEDCOM RST916C
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916P
Siemens / RUGGEDCOM RST916P
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM ROS V4.X NC products
Siemens / RUGGEDCOM ROS V4.X NC products
|
vers:all/* | ||
|
RUGGEDCOM ROS V5.X NC products
Siemens / RUGGEDCOM ROS V5.X NC products
|
vers:all/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM RMC8388 V5.X
Siemens / RUGGEDCOM RMC8388 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RMC8388NC V5.X
Siemens / RUGGEDCOM RMC8388NC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416NCv2 V5.X
Siemens / RUGGEDCOM RS416NCv2 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416PNCv2 V5.X
Siemens / RUGGEDCOM RS416PNCv2 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416Pv2 V5.X
Siemens / RUGGEDCOM RS416Pv2 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416v2 V5.X
Siemens / RUGGEDCOM RS416v2 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900 (32M) V5.X
Siemens / RUGGEDCOM RS900 (32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900G (32M) V5.X
Siemens / RUGGEDCOM RS900G (32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900GNC(32M) V5.X
Siemens / RUGGEDCOM RS900GNC(32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900NC(32M) V5.X
Siemens / RUGGEDCOM RS900NC(32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100 (32M) V5.X
Siemens / RUGGEDCOM RSG2100 (32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100NC(32M) V5.X
Siemens / RUGGEDCOM RSG2100NC(32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100P (32M) V5.X
Siemens / RUGGEDCOM RSG2100P (32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100PNC (32M) V5.X
Siemens / RUGGEDCOM RSG2100PNC (32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2288 V5.X
Siemens / RUGGEDCOM RSG2288 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2288NC V5.X
Siemens / RUGGEDCOM RSG2288NC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300 V5.X
Siemens / RUGGEDCOM RSG2300 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300NC V5.X
Siemens / RUGGEDCOM RSG2300NC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300P V5.X
Siemens / RUGGEDCOM RSG2300P V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300PNC V5.X
Siemens / RUGGEDCOM RSG2300PNC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2488 V5.X
Siemens / RUGGEDCOM RSG2488 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2488NC V5.X
Siemens / RUGGEDCOM RSG2488NC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG907R
Siemens / RUGGEDCOM RSG907R
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG908C
Siemens / RUGGEDCOM RSG908C
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG909R
Siemens / RUGGEDCOM RSG909R
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG910C
Siemens / RUGGEDCOM RSG910C
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG920P V5.X
Siemens / RUGGEDCOM RSG920P V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG920PNC V5.X
Siemens / RUGGEDCOM RSG920PNC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSL910
Siemens / RUGGEDCOM RSL910
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSL910NC
Siemens / RUGGEDCOM RSL910NC
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228
Siemens / RUGGEDCOM RST2228
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228P
Siemens / RUGGEDCOM RST2228P
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916C
Siemens / RUGGEDCOM RST916C
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916P
Siemens / RUGGEDCOM RST916P
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM ROS V4.X family
Siemens / RUGGEDCOM ROS V4.X family
|
vers:all/* |
{
"document": {
"acknowledgments": [
{
"names": [
"Thomas Riedmaier"
],
"organization": "Siemens Energy",
"summary": "reporting these vulnerabilities to Siemens."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities affect the RUGGEDCOM Operating System (ROS). \n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy \u0026 Use policy (https://www.cisa.gov/privacy-policy).",
"title": "Legal Notice and Terms of Use"
},
{
"category": "other",
"text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-083019 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-083019.json"
},
{
"category": "self",
"summary": "SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-083019.html"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-294-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-294-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-25-294-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-294-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-alerts/ics-alert-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/news/targeted-cyber-intrusion-detection-and-mitigation-strategies-update-b"
}
],
"title": "Siemens RUGGEDCOM ROS Devices",
"tracking": {
"current_release_date": "2025-10-14T00:00:00.000000Z",
"generator": {
"date": "2025-10-21T14:35:12.983981Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-294-04",
"initial_release_date": "2025-07-08T00:00:00.000000Z",
"revision_history": [
{
"date": "2025-07-08T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-10-14T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added acknowledgements"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM i800",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i800"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM i801",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM i802",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM i803",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM M2100",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM M2200",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM M969",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RMC30",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC30"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RMC8388 V4.X",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388 V5.X",
"product_id": "CSAFPID-0010"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388NC V5.X",
"product_id": "CSAFPID-0011"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROS V4.X family",
"product_id": "CSAFPID-0012"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROS V4.X family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROS V4.X NC products",
"product_id": "CSAFPID-0013"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROS V4.X NC products"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROS V5.X NC products",
"product_id": "CSAFPID-0014"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROS V5.X NC products"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RP110",
"product_id": "CSAFPID-0015"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS1600",
"product_id": "CSAFPID-0016"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS1600F",
"product_id": "CSAFPID-0017"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600F"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS1600T",
"product_id": "CSAFPID-0018"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS400",
"product_id": "CSAFPID-0019"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS401",
"product_id": "CSAFPID-0020"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS416",
"product_id": "CSAFPID-0021"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS416NCv2 V5.X",
"product_id": "CSAFPID-0022"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS416P",
"product_id": "CSAFPID-0023"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS416PNCv2 V5.X",
"product_id": "CSAFPID-0024"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS416Pv2 V4.X",
"product_id": "CSAFPID-0025"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS416Pv2 V5.X",
"product_id": "CSAFPID-0026"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS416v2 V4.X",
"product_id": "CSAFPID-0027"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS416v2 V5.X",
"product_id": "CSAFPID-0028"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS8000",
"product_id": "CSAFPID-0029"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS8000A",
"product_id": "CSAFPID-0030"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS8000H",
"product_id": "CSAFPID-0031"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000H"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS8000T",
"product_id": "CSAFPID-0032"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900",
"product_id": "CSAFPID-0033"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900 (32M) V4.X",
"product_id": "CSAFPID-0034"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS900 (32M) V5.X",
"product_id": "CSAFPID-0035"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900G",
"product_id": "CSAFPID-0036"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900G (32M) V4.X",
"product_id": "CSAFPID-0037"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS900G (32M) V5.X",
"product_id": "CSAFPID-0038"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS900GNC(32M) V5.X",
"product_id": "CSAFPID-0039"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900GP",
"product_id": "CSAFPID-0040"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900L",
"product_id": "CSAFPID-0041"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900M-GETS-C01",
"product_id": "CSAFPID-0042"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900M-GETS-XX",
"product_id": "CSAFPID-0043"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900M-STND-C01",
"product_id": "CSAFPID-0044"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900M-STND-XX",
"product_id": "CSAFPID-0045"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS900NC(32M) V5.X",
"product_id": "CSAFPID-0046"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900W",
"product_id": "CSAFPID-0047"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS910",
"product_id": "CSAFPID-0048"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS910L",
"product_id": "CSAFPID-0049"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS910W",
"product_id": "CSAFPID-0050"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS920L",
"product_id": "CSAFPID-0051"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS920W",
"product_id": "CSAFPID-0052"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS930L",
"product_id": "CSAFPID-0053"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS930W",
"product_id": "CSAFPID-0054"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS940G",
"product_id": "CSAFPID-0055"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS969",
"product_id": "CSAFPID-0056"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2100",
"product_id": "CSAFPID-0057"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V4.X",
"product_id": "CSAFPID-0058"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V5.X",
"product_id": "CSAFPID-0059"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100NC(32M) V5.X",
"product_id": "CSAFPID-0060"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2100P",
"product_id": "CSAFPID-0061"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V4.X",
"product_id": "CSAFPID-0062"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V5.X",
"product_id": "CSAFPID-0063"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X",
"product_id": "CSAFPID-0064"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2200",
"product_id": "CSAFPID-0065"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2288 V4.X",
"product_id": "CSAFPID-0066"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288 V5.X",
"product_id": "CSAFPID-0067"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288NC V5.X",
"product_id": "CSAFPID-0068"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2300 V4.X",
"product_id": "CSAFPID-0069"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300 V5.X",
"product_id": "CSAFPID-0070"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300NC V5.X",
"product_id": "CSAFPID-0071"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2300P V4.X",
"product_id": "CSAFPID-0072"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300P V5.X",
"product_id": "CSAFPID-0073"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300PNC V5.X",
"product_id": "CSAFPID-0074"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2488 V4.X",
"product_id": "CSAFPID-0075"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488 V5.X",
"product_id": "CSAFPID-0076"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488NC V5.X",
"product_id": "CSAFPID-0077"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG907R",
"product_id": "CSAFPID-0078"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG907R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG908C",
"product_id": "CSAFPID-0079"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG908C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG909R",
"product_id": "CSAFPID-0080"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG909R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG910C",
"product_id": "CSAFPID-0081"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG910C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG920P V4.X",
"product_id": "CSAFPID-0082"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG920P V5.X",
"product_id": "CSAFPID-0083"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG920PNC V5.X",
"product_id": "CSAFPID-0084"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSL910",
"product_id": "CSAFPID-0085"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSL910NC",
"product_id": "CSAFPID-0086"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RST2228",
"product_id": "CSAFPID-0087"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RST2228P",
"product_id": "CSAFPID-0088"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RST916C",
"product_id": "CSAFPID-0089"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RST916P",
"product_id": "CSAFPID-0090"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916P"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-52236",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"flags": [
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"CSAFPID-0013",
"CSAFPID-0014"
]
}
],
"notes": [
{
"category": "summary",
"text": "The affected products support insecure cryptographic algorithms. An attacker could leverage these legacy algorithms to achieve a man-in-the-middle attack or impersonate communicating parties.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
],
"known_not_affected": [
"CSAFPID-0013",
"CSAFPID-0014"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict access to port 80/tcp, 443/tcp and 22/tcp to trusted IP addresses only",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
]
},
{
"category": "mitigation",
"details": "Deactivate the webserver if not required, and if deactivation is supported by the product",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
]
},
{
"category": "mitigation",
"details": "Deactivate the SSH server if not required, and if deactivation is supported by the product",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0027",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0069",
"CSAFPID-0072",
"CSAFPID-0075",
"CSAFPID-0082"
]
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"CSAFPID-0010",
"CSAFPID-0026",
"CSAFPID-0028",
"CSAFPID-0035",
"CSAFPID-0038",
"CSAFPID-0059",
"CSAFPID-0063",
"CSAFPID-0067",
"CSAFPID-0070",
"CSAFPID-0073",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
]
}
],
"threats": [
{
"category": "impact",
"details": "The affected features are not supported.",
"product_ids": [
"CSAFPID-0013",
"CSAFPID-0014"
]
}
],
"title": "CVE-2023-52236"
},
{
"cve": "CVE-2025-41222",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"flags": [
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"CSAFPID-0013",
"CSAFPID-0014"
]
}
],
"notes": [
{
"category": "summary",
"text": "Affected devices do not properly handle malformed TLS handshake messages. This could allow an attacker with network access to the webserver to cause a denial of service resulting in the web server and the device to crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
],
"known_not_affected": [
"CSAFPID-0013",
"CSAFPID-0014"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict access to port 80/tcp, 443/tcp and 22/TCP, to trusted IP addresses only",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
]
},
{
"category": "mitigation",
"details": "Deactivate the webserver if not required, and if deactivation is supported by the product",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
]
},
{
"category": "mitigation",
"details": "Deactivate the SSH server if not required, and if deactivation is supported by the product",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0027",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0069",
"CSAFPID-0072",
"CSAFPID-0075",
"CSAFPID-0082"
]
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"CSAFPID-0010",
"CSAFPID-0026",
"CSAFPID-0028",
"CSAFPID-0035",
"CSAFPID-0038",
"CSAFPID-0059",
"CSAFPID-0063",
"CSAFPID-0067",
"CSAFPID-0070",
"CSAFPID-0073",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
]
}
],
"threats": [
{
"category": "impact",
"details": "The affected features are not supported.",
"product_ids": [
"CSAFPID-0013",
"CSAFPID-0014"
]
}
],
"title": "CVE-2025-41222"
},
{
"cve": "CVE-2025-41223",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"flags": [
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"CSAFPID-0013",
"CSAFPID-0014"
]
}
],
"notes": [
{
"category": "summary",
"text": "The affected devices support the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite, which uses CBC (Cipher Block Chaining) mode that is known to be vulnerable to timing attacks. This could allow an attacker to compromise the integrity and confidentiality of encrypted communications.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
],
"known_not_affected": [
"CSAFPID-0013",
"CSAFPID-0014"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Configure the web client to use GCM ciphers; for list of ROS supported cipher suites refer to configuration manual",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0027",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0069",
"CSAFPID-0072",
"CSAFPID-0075",
"CSAFPID-0082"
]
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"CSAFPID-0010",
"CSAFPID-0026",
"CSAFPID-0028",
"CSAFPID-0035",
"CSAFPID-0038",
"CSAFPID-0059",
"CSAFPID-0063",
"CSAFPID-0067",
"CSAFPID-0070",
"CSAFPID-0073",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009",
"CSAFPID-0010",
"CSAFPID-0015",
"CSAFPID-0016",
"CSAFPID-0017",
"CSAFPID-0018",
"CSAFPID-0019",
"CSAFPID-0020",
"CSAFPID-0021",
"CSAFPID-0023",
"CSAFPID-0025",
"CSAFPID-0026",
"CSAFPID-0027",
"CSAFPID-0028",
"CSAFPID-0029",
"CSAFPID-0030",
"CSAFPID-0031",
"CSAFPID-0032",
"CSAFPID-0033",
"CSAFPID-0034",
"CSAFPID-0035",
"CSAFPID-0036",
"CSAFPID-0037",
"CSAFPID-0038",
"CSAFPID-0040",
"CSAFPID-0041",
"CSAFPID-0042",
"CSAFPID-0043",
"CSAFPID-0044",
"CSAFPID-0045",
"CSAFPID-0047",
"CSAFPID-0048",
"CSAFPID-0049",
"CSAFPID-0050",
"CSAFPID-0051",
"CSAFPID-0052",
"CSAFPID-0053",
"CSAFPID-0054",
"CSAFPID-0055",
"CSAFPID-0056",
"CSAFPID-0057",
"CSAFPID-0058",
"CSAFPID-0059",
"CSAFPID-0061",
"CSAFPID-0062",
"CSAFPID-0063",
"CSAFPID-0065",
"CSAFPID-0066",
"CSAFPID-0067",
"CSAFPID-0069",
"CSAFPID-0070",
"CSAFPID-0072",
"CSAFPID-0073",
"CSAFPID-0075",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0082",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
]
}
],
"threats": [
{
"category": "impact",
"details": "The affected features are not supported.",
"product_ids": [
"CSAFPID-0013",
"CSAFPID-0014"
]
}
],
"title": "CVE-2025-41223"
},
{
"cve": "CVE-2025-41224",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"CSAFPID-0012"
]
}
],
"notes": [
{
"category": "summary",
"text": "The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0022",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0028",
"CSAFPID-0035",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0046",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0076",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0083",
"CSAFPID-0084",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
],
"known_not_affected": [
"CSAFPID-0012"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"CSAFPID-0010",
"CSAFPID-0026",
"CSAFPID-0028",
"CSAFPID-0035",
"CSAFPID-0038",
"CSAFPID-0059",
"CSAFPID-0063",
"CSAFPID-0067",
"CSAFPID-0070",
"CSAFPID-0073",
"CSAFPID-0076",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0083",
"CSAFPID-0085",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"CSAFPID-0011",
"CSAFPID-0022",
"CSAFPID-0024",
"CSAFPID-0039",
"CSAFPID-0046",
"CSAFPID-0060",
"CSAFPID-0064",
"CSAFPID-0068",
"CSAFPID-0071",
"CSAFPID-0074",
"CSAFPID-0077",
"CSAFPID-0084",
"CSAFPID-0086"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0010",
"CSAFPID-0011",
"CSAFPID-0022",
"CSAFPID-0024",
"CSAFPID-0026",
"CSAFPID-0028",
"CSAFPID-0035",
"CSAFPID-0038",
"CSAFPID-0039",
"CSAFPID-0046",
"CSAFPID-0059",
"CSAFPID-0060",
"CSAFPID-0063",
"CSAFPID-0064",
"CSAFPID-0067",
"CSAFPID-0068",
"CSAFPID-0070",
"CSAFPID-0071",
"CSAFPID-0073",
"CSAFPID-0074",
"CSAFPID-0076",
"CSAFPID-0077",
"CSAFPID-0078",
"CSAFPID-0079",
"CSAFPID-0080",
"CSAFPID-0081",
"CSAFPID-0083",
"CSAFPID-0084",
"CSAFPID-0085",
"CSAFPID-0086",
"CSAFPID-0087",
"CSAFPID-0088",
"CSAFPID-0089",
"CSAFPID-0090"
]
}
],
"threats": [
{
"category": "impact",
"details": "The affected functionality is implemented in a different way and not vulnerable.",
"product_ids": [
"CSAFPID-0012"
]
}
],
"title": "CVE-2025-41224"
}
]
}
SSA-083019
Vulnerability from csaf_siemens - Published: 2025-07-08 00:00 - Updated: 2025-10-14 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM i800
Siemens / RUGGEDCOM i800
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i801
Siemens / RUGGEDCOM i801
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i802
Siemens / RUGGEDCOM i802
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i803
Siemens / RUGGEDCOM i803
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M2100
Siemens / RUGGEDCOM M2100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M2200
Siemens / RUGGEDCOM M2200
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M969
Siemens / RUGGEDCOM M969
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC30
Siemens / RUGGEDCOM RMC30
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V4.X
Siemens / RUGGEDCOM RMC8388 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V5.X
Siemens / RUGGEDCOM RMC8388 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RP110
Siemens / RUGGEDCOM RP110
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600
Siemens / RUGGEDCOM RS1600
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600F
Siemens / RUGGEDCOM RS1600F
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600T
Siemens / RUGGEDCOM RS1600T
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS400
Siemens / RUGGEDCOM RS400
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS401
Siemens / RUGGEDCOM RS401
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416
Siemens / RUGGEDCOM RS416
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416P
Siemens / RUGGEDCOM RS416P
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V4.X
Siemens / RUGGEDCOM RS416Pv2 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V5.X
Siemens / RUGGEDCOM RS416Pv2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416v2 V4.X
Siemens / RUGGEDCOM RS416v2 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416v2 V5.X
Siemens / RUGGEDCOM RS416v2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS8000
Siemens / RUGGEDCOM RS8000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000A
Siemens / RUGGEDCOM RS8000A
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000H
Siemens / RUGGEDCOM RS8000H
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000T
Siemens / RUGGEDCOM RS8000T
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900
Siemens / RUGGEDCOM RS900
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V4.X
Siemens / RUGGEDCOM RS900 (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V5.X
Siemens / RUGGEDCOM RS900 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900G
Siemens / RUGGEDCOM RS900G
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V4.X
Siemens / RUGGEDCOM RS900G (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V5.X
Siemens / RUGGEDCOM RS900G (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900GP
Siemens / RUGGEDCOM RS900GP
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900L
Siemens / RUGGEDCOM RS900L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-C01
Siemens / RUGGEDCOM RS900M-GETS-C01
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-XX
Siemens / RUGGEDCOM RS900M-GETS-XX
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-C01
Siemens / RUGGEDCOM RS900M-STND-C01
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-XX
Siemens / RUGGEDCOM RS900M-STND-XX
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900W
Siemens / RUGGEDCOM RS900W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910
Siemens / RUGGEDCOM RS910
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910L
Siemens / RUGGEDCOM RS910L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910W
Siemens / RUGGEDCOM RS910W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS920L
Siemens / RUGGEDCOM RS920L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS920W
Siemens / RUGGEDCOM RS920W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS930L
Siemens / RUGGEDCOM RS930L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS930W
Siemens / RUGGEDCOM RS930W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS940G
Siemens / RUGGEDCOM RS940G
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS969
Siemens / RUGGEDCOM RS969
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100
Siemens / RUGGEDCOM RSG2100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V4.X
Siemens / RUGGEDCOM RSG2100 (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V5.X
Siemens / RUGGEDCOM RSG2100 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100P
Siemens / RUGGEDCOM RSG2100P
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V4.X
Siemens / RUGGEDCOM RSG2100P (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V5.X
Siemens / RUGGEDCOM RSG2100P (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2200
Siemens / RUGGEDCOM RSG2200
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V4.X
Siemens / RUGGEDCOM RSG2288 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V5.X
Siemens / RUGGEDCOM RSG2288 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300 V4.X
Siemens / RUGGEDCOM RSG2300 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300 V5.X
Siemens / RUGGEDCOM RSG2300 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300P V4.X
Siemens / RUGGEDCOM RSG2300P V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300P V5.X
Siemens / RUGGEDCOM RSG2300P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2488 V4.X
Siemens / RUGGEDCOM RSG2488 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2488 V5.X
Siemens / RUGGEDCOM RSG2488 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG907R
Siemens / RUGGEDCOM RSG907R
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG908C
Siemens / RUGGEDCOM RSG908C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG909R
Siemens / RUGGEDCOM RSG909R
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG910C
Siemens / RUGGEDCOM RSG910C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG920P V4.X
Siemens / RUGGEDCOM RSG920P V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG920P V5.X
Siemens / RUGGEDCOM RSG920P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSL910
Siemens / RUGGEDCOM RSL910
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228
Siemens / RUGGEDCOM RST2228
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228P
Siemens / RUGGEDCOM RST2228P
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916C
Siemens / RUGGEDCOM RST916C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916P
Siemens / RUGGEDCOM RST916P
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM ROS V4.X NC products
Siemens / RUGGEDCOM ROS V4.X NC products
|
vers:all/* | ||
|
RUGGEDCOM ROS V5.X NC products
Siemens / RUGGEDCOM ROS V5.X NC products
|
vers:all/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM i800
Siemens / RUGGEDCOM i800
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i801
Siemens / RUGGEDCOM i801
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i802
Siemens / RUGGEDCOM i802
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM i803
Siemens / RUGGEDCOM i803
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M2100
Siemens / RUGGEDCOM M2100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M2200
Siemens / RUGGEDCOM M2200
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM M969
Siemens / RUGGEDCOM M969
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC30
Siemens / RUGGEDCOM RMC30
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V4.X
Siemens / RUGGEDCOM RMC8388 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V5.X
Siemens / RUGGEDCOM RMC8388 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RP110
Siemens / RUGGEDCOM RP110
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600
Siemens / RUGGEDCOM RS1600
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600F
Siemens / RUGGEDCOM RS1600F
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600T
Siemens / RUGGEDCOM RS1600T
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS400
Siemens / RUGGEDCOM RS400
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS401
Siemens / RUGGEDCOM RS401
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416
Siemens / RUGGEDCOM RS416
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416P
Siemens / RUGGEDCOM RS416P
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V4.X
Siemens / RUGGEDCOM RS416Pv2 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V5.X
Siemens / RUGGEDCOM RS416Pv2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416v2 V4.X
Siemens / RUGGEDCOM RS416v2 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS416v2 V5.X
Siemens / RUGGEDCOM RS416v2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS8000
Siemens / RUGGEDCOM RS8000
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000A
Siemens / RUGGEDCOM RS8000A
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000H
Siemens / RUGGEDCOM RS8000H
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000T
Siemens / RUGGEDCOM RS8000T
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900
Siemens / RUGGEDCOM RS900
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V4.X
Siemens / RUGGEDCOM RS900 (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V5.X
Siemens / RUGGEDCOM RS900 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900G
Siemens / RUGGEDCOM RS900G
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V4.X
Siemens / RUGGEDCOM RS900G (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V5.X
Siemens / RUGGEDCOM RS900G (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900GP
Siemens / RUGGEDCOM RS900GP
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900L
Siemens / RUGGEDCOM RS900L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-C01
Siemens / RUGGEDCOM RS900M-GETS-C01
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-XX
Siemens / RUGGEDCOM RS900M-GETS-XX
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-C01
Siemens / RUGGEDCOM RS900M-STND-C01
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-XX
Siemens / RUGGEDCOM RS900M-STND-XX
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS900W
Siemens / RUGGEDCOM RS900W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910
Siemens / RUGGEDCOM RS910
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910L
Siemens / RUGGEDCOM RS910L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS910W
Siemens / RUGGEDCOM RS910W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS920L
Siemens / RUGGEDCOM RS920L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS920W
Siemens / RUGGEDCOM RS920W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS930L
Siemens / RUGGEDCOM RS930L
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS930W
Siemens / RUGGEDCOM RS930W
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS940G
Siemens / RUGGEDCOM RS940G
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RS969
Siemens / RUGGEDCOM RS969
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100
Siemens / RUGGEDCOM RSG2100
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V4.X
Siemens / RUGGEDCOM RSG2100 (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V5.X
Siemens / RUGGEDCOM RSG2100 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100P
Siemens / RUGGEDCOM RSG2100P
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V4.X
Siemens / RUGGEDCOM RSG2100P (32M) V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V5.X
Siemens / RUGGEDCOM RSG2100P (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2200
Siemens / RUGGEDCOM RSG2200
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V4.X
Siemens / RUGGEDCOM RSG2288 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V5.X
Siemens / RUGGEDCOM RSG2288 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300 V4.X
Siemens / RUGGEDCOM RSG2300 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300 V5.X
Siemens / RUGGEDCOM RSG2300 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300P V4.X
Siemens / RUGGEDCOM RSG2300P V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300P V5.X
Siemens / RUGGEDCOM RSG2300P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2488 V4.X
Siemens / RUGGEDCOM RSG2488 V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2488 V5.X
Siemens / RUGGEDCOM RSG2488 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG907R
Siemens / RUGGEDCOM RSG907R
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG908C
Siemens / RUGGEDCOM RSG908C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG909R
Siemens / RUGGEDCOM RSG909R
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG910C
Siemens / RUGGEDCOM RSG910C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG920P V4.X
Siemens / RUGGEDCOM RSG920P V4.X
|
vers:all/* |
Mitigation
Mitigation
Mitigation
None Available
|
|
|
RUGGEDCOM RSG920P V5.X
Siemens / RUGGEDCOM RSG920P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSL910
Siemens / RUGGEDCOM RSL910
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228
Siemens / RUGGEDCOM RST2228
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228P
Siemens / RUGGEDCOM RST2228P
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916C
Siemens / RUGGEDCOM RST916C
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916P
Siemens / RUGGEDCOM RST916P
|
vers:intdot/<5.10.0 |
Mitigation
Mitigation
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM ROS V4.X NC products
Siemens / RUGGEDCOM ROS V4.X NC products
|
vers:all/* | ||
|
RUGGEDCOM ROS V5.X NC products
Siemens / RUGGEDCOM ROS V5.X NC products
|
vers:all/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM i800
Siemens / RUGGEDCOM i800
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM i801
Siemens / RUGGEDCOM i801
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM i802
Siemens / RUGGEDCOM i802
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM i803
Siemens / RUGGEDCOM i803
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM M2100
Siemens / RUGGEDCOM M2100
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM M2200
Siemens / RUGGEDCOM M2200
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM M969
Siemens / RUGGEDCOM M969
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RMC30
Siemens / RUGGEDCOM RMC30
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V4.X
Siemens / RUGGEDCOM RMC8388 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RMC8388 V5.X
Siemens / RUGGEDCOM RMC8388 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RP110
Siemens / RUGGEDCOM RP110
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600
Siemens / RUGGEDCOM RS1600
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600F
Siemens / RUGGEDCOM RS1600F
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS1600T
Siemens / RUGGEDCOM RS1600T
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS400
Siemens / RUGGEDCOM RS400
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS401
Siemens / RUGGEDCOM RS401
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS416
Siemens / RUGGEDCOM RS416
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS416P
Siemens / RUGGEDCOM RS416P
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V4.X
Siemens / RUGGEDCOM RS416Pv2 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS416Pv2 V5.X
Siemens / RUGGEDCOM RS416Pv2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416v2 V4.X
Siemens / RUGGEDCOM RS416v2 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS416v2 V5.X
Siemens / RUGGEDCOM RS416v2 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS8000
Siemens / RUGGEDCOM RS8000
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000A
Siemens / RUGGEDCOM RS8000A
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000H
Siemens / RUGGEDCOM RS8000H
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS8000T
Siemens / RUGGEDCOM RS8000T
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900
Siemens / RUGGEDCOM RS900
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V4.X
Siemens / RUGGEDCOM RS900 (32M) V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900 (32M) V5.X
Siemens / RUGGEDCOM RS900 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900G
Siemens / RUGGEDCOM RS900G
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V4.X
Siemens / RUGGEDCOM RS900G (32M) V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900G (32M) V5.X
Siemens / RUGGEDCOM RS900G (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900GP
Siemens / RUGGEDCOM RS900GP
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900L
Siemens / RUGGEDCOM RS900L
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-C01
Siemens / RUGGEDCOM RS900M-GETS-C01
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-GETS-XX
Siemens / RUGGEDCOM RS900M-GETS-XX
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-C01
Siemens / RUGGEDCOM RS900M-STND-C01
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900M-STND-XX
Siemens / RUGGEDCOM RS900M-STND-XX
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS900W
Siemens / RUGGEDCOM RS900W
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS910
Siemens / RUGGEDCOM RS910
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS910L
Siemens / RUGGEDCOM RS910L
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS910W
Siemens / RUGGEDCOM RS910W
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS920L
Siemens / RUGGEDCOM RS920L
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS920W
Siemens / RUGGEDCOM RS920W
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS930L
Siemens / RUGGEDCOM RS930L
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS930W
Siemens / RUGGEDCOM RS930W
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS940G
Siemens / RUGGEDCOM RS940G
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RS969
Siemens / RUGGEDCOM RS969
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100
Siemens / RUGGEDCOM RSG2100
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V4.X
Siemens / RUGGEDCOM RSG2100 (32M) V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100 (32M) V5.X
Siemens / RUGGEDCOM RSG2100 (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100P
Siemens / RUGGEDCOM RSG2100P
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V4.X
Siemens / RUGGEDCOM RSG2100P (32M) V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2100P (32M) V5.X
Siemens / RUGGEDCOM RSG2100P (32M) V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2200
Siemens / RUGGEDCOM RSG2200
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V4.X
Siemens / RUGGEDCOM RSG2288 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2288 V5.X
Siemens / RUGGEDCOM RSG2288 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300 V4.X
Siemens / RUGGEDCOM RSG2300 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300 V5.X
Siemens / RUGGEDCOM RSG2300 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300P V4.X
Siemens / RUGGEDCOM RSG2300P V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2300P V5.X
Siemens / RUGGEDCOM RSG2300P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2488 V4.X
Siemens / RUGGEDCOM RSG2488 V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG2488 V5.X
Siemens / RUGGEDCOM RSG2488 V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG907R
Siemens / RUGGEDCOM RSG907R
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG908C
Siemens / RUGGEDCOM RSG908C
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG909R
Siemens / RUGGEDCOM RSG909R
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG910C
Siemens / RUGGEDCOM RSG910C
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG920P V4.X
Siemens / RUGGEDCOM RSG920P V4.X
|
vers:all/* |
Mitigation
None Available
|
|
|
RUGGEDCOM RSG920P V5.X
Siemens / RUGGEDCOM RSG920P V5.X
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RSL910
Siemens / RUGGEDCOM RSL910
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228
Siemens / RUGGEDCOM RST2228
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228P
Siemens / RUGGEDCOM RST2228P
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916C
Siemens / RUGGEDCOM RST916C
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916P
Siemens / RUGGEDCOM RST916P
|
vers:intdot/<5.10.0 |
Mitigation
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM ROS V4.X NC products
Siemens / RUGGEDCOM ROS V4.X NC products
|
vers:all/* | ||
|
RUGGEDCOM ROS V5.X NC products
Siemens / RUGGEDCOM ROS V5.X NC products
|
vers:all/* |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM RMC8388 V5.X
Siemens / RUGGEDCOM RMC8388 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RMC8388NC V5.X
Siemens / RUGGEDCOM RMC8388NC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416NCv2 V5.X
Siemens / RUGGEDCOM RS416NCv2 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416PNCv2 V5.X
Siemens / RUGGEDCOM RS416PNCv2 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416Pv2 V5.X
Siemens / RUGGEDCOM RS416Pv2 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS416v2 V5.X
Siemens / RUGGEDCOM RS416v2 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900 (32M) V5.X
Siemens / RUGGEDCOM RS900 (32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900G (32M) V5.X
Siemens / RUGGEDCOM RS900G (32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900GNC(32M) V5.X
Siemens / RUGGEDCOM RS900GNC(32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RS900NC(32M) V5.X
Siemens / RUGGEDCOM RS900NC(32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100 (32M) V5.X
Siemens / RUGGEDCOM RSG2100 (32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100NC(32M) V5.X
Siemens / RUGGEDCOM RSG2100NC(32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100P (32M) V5.X
Siemens / RUGGEDCOM RSG2100P (32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2100PNC (32M) V5.X
Siemens / RUGGEDCOM RSG2100PNC (32M) V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2288 V5.X
Siemens / RUGGEDCOM RSG2288 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2288NC V5.X
Siemens / RUGGEDCOM RSG2288NC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300 V5.X
Siemens / RUGGEDCOM RSG2300 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300NC V5.X
Siemens / RUGGEDCOM RSG2300NC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300P V5.X
Siemens / RUGGEDCOM RSG2300P V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2300PNC V5.X
Siemens / RUGGEDCOM RSG2300PNC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2488 V5.X
Siemens / RUGGEDCOM RSG2488 V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG2488NC V5.X
Siemens / RUGGEDCOM RSG2488NC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG907R
Siemens / RUGGEDCOM RSG907R
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG908C
Siemens / RUGGEDCOM RSG908C
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG909R
Siemens / RUGGEDCOM RSG909R
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG910C
Siemens / RUGGEDCOM RSG910C
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG920P V5.X
Siemens / RUGGEDCOM RSG920P V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSG920PNC V5.X
Siemens / RUGGEDCOM RSG920PNC V5.X
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSL910
Siemens / RUGGEDCOM RSL910
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RSL910NC
Siemens / RUGGEDCOM RSL910NC
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228
Siemens / RUGGEDCOM RST2228
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RST2228P
Siemens / RUGGEDCOM RST2228P
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916C
Siemens / RUGGEDCOM RST916C
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
|
|
RUGGEDCOM RST916P
Siemens / RUGGEDCOM RST916P
|
vers:intdot/<5.10.0 |
Vendor Fix
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
RUGGEDCOM ROS V4.X family
Siemens / RUGGEDCOM ROS V4.X family
|
vers:all/* |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities affect the RUGGEDCOM Operating System (ROS). \n\nSiemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not, or not yet available.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-083019.html"
},
{
"category": "self",
"summary": "SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-083019.json"
}
],
"title": "SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices",
"tracking": {
"current_release_date": "2025-10-14T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-083019",
"initial_release_date": "2025-07-08T00:00:00Z",
"revision_history": [
{
"date": "2025-07-08T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-10-14T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added acknowledgements"
}
],
"status": "interim",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM i800",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i800"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM i801",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i801"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM i802",
"product_id": "3"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i802"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM i803",
"product_id": "4"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM i803"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM M2100",
"product_id": "5"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM M2200",
"product_id": "6"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM M969",
"product_id": "7"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM M969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RMC30",
"product_id": "8"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC30"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RMC8388 V4.X",
"product_id": "9"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388 V5.X",
"product_id": "10"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RMC8388NC V5.X",
"product_id": "11"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RMC8388NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROS V4.X family",
"product_id": "12"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROS V4.X family"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROS V4.X NC products",
"product_id": "13"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROS V4.X NC products"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM ROS V5.X NC products",
"product_id": "14"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM ROS V5.X NC products"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RP110",
"product_id": "15"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RP110"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS1600",
"product_id": "16"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS1600F",
"product_id": "17"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600F"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS1600T",
"product_id": "18"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS1600T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS400",
"product_id": "19"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS400"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS401",
"product_id": "20"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS401"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS416",
"product_id": "21"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS416NCv2 V5.X",
"product_id": "22"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416NCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS416P",
"product_id": "23"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS416PNCv2 V5.X",
"product_id": "24"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416PNCv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS416Pv2 V4.X",
"product_id": "25"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS416Pv2 V5.X",
"product_id": "26"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416Pv2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS416v2 V4.X",
"product_id": "27"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS416v2 V5.X",
"product_id": "28"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS416v2 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS8000",
"product_id": "29"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS8000A",
"product_id": "30"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000A"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS8000H",
"product_id": "31"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000H"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS8000T",
"product_id": "32"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS8000T"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900",
"product_id": "33"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900 (32M) V4.X",
"product_id": "34"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS900 (32M) V5.X",
"product_id": "35"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900G",
"product_id": "36"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900G (32M) V4.X",
"product_id": "37"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS900G (32M) V5.X",
"product_id": "38"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900G (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS900GNC(32M) V5.X",
"product_id": "39"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GNC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900GP",
"product_id": "40"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900GP"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900L",
"product_id": "41"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900M-GETS-C01",
"product_id": "42"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900M-GETS-XX",
"product_id": "43"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-GETS-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900M-STND-C01",
"product_id": "44"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-C01"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900M-STND-XX",
"product_id": "45"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900M-STND-XX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RS900NC(32M) V5.X",
"product_id": "46"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS900W",
"product_id": "47"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS900W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS910",
"product_id": "48"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS910L",
"product_id": "49"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS910W",
"product_id": "50"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS910W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS920L",
"product_id": "51"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS920W",
"product_id": "52"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS920W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS930L",
"product_id": "53"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930L"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS930W",
"product_id": "54"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS930W"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS940G",
"product_id": "55"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS940G"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RS969",
"product_id": "56"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RS969"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2100",
"product_id": "57"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V4.X",
"product_id": "58"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100 (32M) V5.X",
"product_id": "59"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100 (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100NC(32M) V5.X",
"product_id": "60"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100NC(32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2100P",
"product_id": "61"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V4.X",
"product_id": "62"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100P (32M) V5.X",
"product_id": "63"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100P (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X",
"product_id": "64"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2100PNC (32M) V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2200",
"product_id": "65"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2200"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2288 V4.X",
"product_id": "66"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288 V5.X",
"product_id": "67"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2288NC V5.X",
"product_id": "68"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2288NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2300 V4.X",
"product_id": "69"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300 V5.X",
"product_id": "70"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300NC V5.X",
"product_id": "71"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2300P V4.X",
"product_id": "72"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300P V5.X",
"product_id": "73"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2300PNC V5.X",
"product_id": "74"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2300PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG2488 V4.X",
"product_id": "75"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488 V5.X",
"product_id": "76"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488 V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG2488NC V5.X",
"product_id": "77"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG2488NC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG907R",
"product_id": "78"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG907R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG908C",
"product_id": "79"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG908C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG909R",
"product_id": "80"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG909R"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG910C",
"product_id": "81"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG910C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "RUGGEDCOM RSG920P V4.X",
"product_id": "82"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V4.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG920P V5.X",
"product_id": "83"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920P V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSG920PNC V5.X",
"product_id": "84"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSG920PNC V5.X"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSL910",
"product_id": "85"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RSL910NC",
"product_id": "86"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RSL910NC"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RST2228",
"product_id": "87"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RST2228P",
"product_id": "88"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST2228P"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RST916C",
"product_id": "89"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916C"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:intdot/\u003c5.10.0",
"product": {
"name": "RUGGEDCOM RST916P",
"product_id": "90"
}
}
],
"category": "product_name",
"name": "RUGGEDCOM RST916P"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-52236",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"flags": [
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"13",
"14"
]
}
],
"notes": [
{
"category": "summary",
"text": "The affected products support insecure cryptographic algorithms. An attacker could leverage these legacy algorithms to achieve a man-in-the-middle attack or impersonate communicating parties.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
],
"known_not_affected": [
"13",
"14"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict access to port 80/tcp, 443/tcp and 22/tcp to trusted IP addresses only",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
]
},
{
"category": "mitigation",
"details": "Deactivate the webserver if not required, and if deactivation is supported by the product",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
]
},
{
"category": "mitigation",
"details": "Deactivate the SSH server if not required, and if deactivation is supported by the product",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"27",
"29",
"30",
"31",
"32",
"33",
"34",
"36",
"37",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"61",
"62",
"65",
"66",
"69",
"72",
"75",
"82"
]
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"10",
"26",
"28",
"35",
"38",
"59",
"63",
"67",
"70",
"73",
"76",
"78",
"79",
"80",
"81",
"83",
"85",
"87",
"88",
"89",
"90"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
]
}
],
"threats": [
{
"category": "impact",
"details": "The affected features are not supported.",
"product_ids": [
"13",
"14"
]
}
],
"title": "CVE-2023-52236"
},
{
"cve": "CVE-2025-41222",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"flags": [
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"13",
"14"
]
}
],
"notes": [
{
"category": "summary",
"text": "Affected devices do not properly handle malformed TLS handshake messages. This could allow an attacker with network access to the webserver to cause a denial of service resulting in the web server and the device to crash.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
],
"known_not_affected": [
"13",
"14"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Restrict access to port 80/tcp, 443/tcp and 22/TCP, to trusted IP addresses only",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
]
},
{
"category": "mitigation",
"details": "Deactivate the webserver if not required, and if deactivation is supported by the product",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
]
},
{
"category": "mitigation",
"details": "Deactivate the SSH server if not required, and if deactivation is supported by the product",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"27",
"29",
"30",
"31",
"32",
"33",
"34",
"36",
"37",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"61",
"62",
"65",
"66",
"69",
"72",
"75",
"82"
]
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"10",
"26",
"28",
"35",
"38",
"59",
"63",
"67",
"70",
"73",
"76",
"78",
"79",
"80",
"81",
"83",
"85",
"87",
"88",
"89",
"90"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
]
}
],
"threats": [
{
"category": "impact",
"details": "The affected features are not supported.",
"product_ids": [
"13",
"14"
]
}
],
"title": "CVE-2025-41222"
},
{
"cve": "CVE-2025-41223",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"flags": [
{
"label": "vulnerable_code_not_in_execute_path",
"product_ids": [
"13",
"14"
]
}
],
"notes": [
{
"category": "summary",
"text": "The affected devices support the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite, which uses CBC (Cipher Block Chaining) mode that is known to be vulnerable to timing attacks. This could allow an attacker to compromise the integrity and confidentiality of encrypted communications.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
],
"known_not_affected": [
"13",
"14"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Configure the web client to use GCM ciphers; for list of ROS supported cipher suites refer to configuration manual",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
]
},
{
"category": "none_available",
"details": "Currently no fix is available",
"product_ids": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"27",
"29",
"30",
"31",
"32",
"33",
"34",
"36",
"37",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"61",
"62",
"65",
"66",
"69",
"72",
"75",
"82"
]
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"10",
"26",
"28",
"35",
"38",
"59",
"63",
"67",
"70",
"73",
"76",
"78",
"79",
"80",
"81",
"83",
"85",
"87",
"88",
"89",
"90"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"23",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38",
"40",
"41",
"42",
"43",
"44",
"45",
"47",
"48",
"49",
"50",
"51",
"52",
"53",
"54",
"55",
"56",
"57",
"58",
"59",
"61",
"62",
"63",
"65",
"66",
"67",
"69",
"70",
"72",
"73",
"75",
"76",
"78",
"79",
"80",
"81",
"82",
"83",
"85",
"87",
"88",
"89",
"90"
]
}
],
"threats": [
{
"category": "impact",
"details": "The affected features are not supported.",
"product_ids": [
"13",
"14"
]
}
],
"title": "CVE-2025-41223"
},
{
"cve": "CVE-2025-41224",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"12"
]
}
],
"notes": [
{
"category": "summary",
"text": "The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"10",
"11",
"22",
"24",
"26",
"28",
"35",
"38",
"39",
"46",
"59",
"60",
"63",
"64",
"67",
"68",
"70",
"71",
"73",
"74",
"76",
"77",
"78",
"79",
"80",
"81",
"83",
"84",
"85",
"86",
"87",
"88",
"89",
"90"
],
"known_not_affected": [
"12"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"10",
"26",
"28",
"35",
"38",
"59",
"63",
"67",
"70",
"73",
"76",
"78",
"79",
"80",
"81",
"83",
"85",
"87",
"88",
"89",
"90"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
},
{
"category": "vendor_fix",
"details": "Update to V5.10.0 or later version",
"product_ids": [
"11",
"22",
"24",
"39",
"46",
"60",
"64",
"68",
"71",
"74",
"77",
"84",
"86"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109989952/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"10",
"11",
"22",
"24",
"26",
"28",
"35",
"38",
"39",
"46",
"59",
"60",
"63",
"64",
"67",
"68",
"70",
"71",
"73",
"74",
"76",
"77",
"78",
"79",
"80",
"81",
"83",
"84",
"85",
"86",
"87",
"88",
"89",
"90"
]
}
],
"threats": [
{
"category": "impact",
"details": "The affected functionality is implemented in a different way and not vulnerable.",
"product_ids": [
"12"
]
}
],
"title": "CVE-2025-41224"
}
]
}
FKIE_CVE-2025-41224
Vulnerability from fkie_nvd - Published: 2025-07-08 11:15 - Updated: 2026-04-15 00:35| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RMC8388NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416NCv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416Pv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416v2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900 (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900G (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2288 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2288NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300P V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300PNC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2488 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2488NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG907R (All versions \u003c V5.10.0), RUGGEDCOM RSG908C (All versions \u003c V5.10.0), RUGGEDCOM RSG909R (All versions \u003c V5.10.0), RUGGEDCOM RSG910C (All versions \u003c V5.10.0), RUGGEDCOM RSG920P V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG920PNC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSL910 (All versions \u003c V5.10.0), RUGGEDCOM RSL910NC (All versions \u003c V5.10.0), RUGGEDCOM RST2228 (All versions \u003c V5.10.0), RUGGEDCOM RST2228P (All versions \u003c V5.10.0), RUGGEDCOM RST916C (All versions \u003c V5.10.0), RUGGEDCOM RST916P (All versions \u003c V5.10.0). The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en RUGGEDCOM RMC8388 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RMC8388NC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS416NCv2 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS416Pv2 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS416v2 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS900 (32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS900G (32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2288 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2288NC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2300 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2300NC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2300P V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2300PNC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2488 V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG2488NC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG907R (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG908C (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG909R (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG910C (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG920P V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSG920PNC V5.X (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSL910 (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RSL910NC (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RST2228 (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RST2228P (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RST916C (Todas las versiones \u0026lt; V5.10.0), RUGGEDCOM RST916P (Todas las versiones \u0026lt; V5.10.0). Los productos afectados no aplican correctamente las restricciones de acceso a la interfaz al cambiar de una configuraci\u00f3n de interfaz de administraci\u00f3n a una de no administraci\u00f3n hasta que se reinicia el sistema, a pesar de que la configuraci\u00f3n se haya guardado. Esto podr\u00eda permitir que un atacante con acceso a la red y credenciales acceda al dispositivo a trav\u00e9s de una configuraci\u00f3n de no administraci\u00f3n y mantenga el acceso SSH hasta el reinicio."
}
],
"id": "CVE-2025-41224",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "productcert@siemens.com",
"type": "Secondary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "productcert@siemens.com",
"type": "Secondary"
}
]
},
"published": "2025-07-08T11:15:31.527",
"references": [
{
"source": "productcert@siemens.com",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-083019.html"
}
],
"sourceIdentifier": "productcert@siemens.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-693"
}
],
"source": "productcert@siemens.com",
"type": "Secondary"
}
]
}
GHSA-FG6G-24V3-5276
Vulnerability from github – Published: 2025-07-08 12:31 – Updated: 2025-07-08 12:31A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RMC8388NC V5.X (All versions < V5.10.0), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2288NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300PNC V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488NC V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSG920PNC V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RSL910NC (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot.
{
"affected": [],
"aliases": [
"CVE-2025-41224"
],
"database_specific": {
"cwe_ids": [
"CWE-693"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-08T11:15:31Z",
"severity": "HIGH"
},
"details": "A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RMC8388NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416NCv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416PNCv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416Pv2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS416v2 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900 (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900G (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900GNC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RS900NC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100 (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100NC(32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100P (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2100PNC (32M) V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2288 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2288NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300P V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2300PNC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2488 V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG2488NC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG907R (All versions \u003c V5.10.0), RUGGEDCOM RSG908C (All versions \u003c V5.10.0), RUGGEDCOM RSG909R (All versions \u003c V5.10.0), RUGGEDCOM RSG910C (All versions \u003c V5.10.0), RUGGEDCOM RSG920P V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSG920PNC V5.X (All versions \u003c V5.10.0), RUGGEDCOM RSL910 (All versions \u003c V5.10.0), RUGGEDCOM RSL910NC (All versions \u003c V5.10.0), RUGGEDCOM RST2228 (All versions \u003c V5.10.0), RUGGEDCOM RST2228P (All versions \u003c V5.10.0), RUGGEDCOM RST916C (All versions \u003c V5.10.0), RUGGEDCOM RST916P (All versions \u003c V5.10.0). The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to device through non-management and maintain SSH access to the device until reboot.",
"id": "GHSA-fg6g-24v3-5276",
"modified": "2025-07-08T12:31:03Z",
"published": "2025-07-08T12:31:03Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41224"
},
{
"type": "WEB",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-083019.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"type": "CVSS_V4"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.