Headline
Siemens RUGGEDCOM ROS Devices
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global). View CSAF
- EXECUTIVE SUMMARY CVSS v4 7.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: RUGGEDCOM ROS Devices Vulnerabilities: Use of a Broken or Risky Cryptographic Algorithm, Improper Handling of Exceptional Conditions, Protection Mechanism Failure
- RISK EVALUATION Successful exploitation of these vulnerabilities could allow attackers to perform man-in-the-middle attacks, cause denial of service, compromise encrypted communications, and gain unauthorized access to devices until a reboot occurs.
- TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS Siemens reports that the following products are affected: RUGGEDCOM i800: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RMC8388 V5.X: All versions before 5.10.0 RUGGEDCOM RMC8388NC V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RP110: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS1600: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS1600F: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS1600T: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS400: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM i801: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS401: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS416: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS416NCv2 V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RS416P: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS416PNCv2 V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RS416Pv2 V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS416Pv2 V5.X: All versions before 5.10.0 RUGGEDCOM RS416v2 V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS416v2 V5.X: All versions before 5.10.0 RUGGEDCOM RS8000: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM i802: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS8000A: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS8000H: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS8000T: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900 (32M) V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900 (32M) V5.X: All versions before 5.10.0 RUGGEDCOM RS900G: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900G (32M) V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900G (32M) V5.X: All versions before 5.10.0 RUGGEDCOM RS900GNC(32M) V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM i803: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900GP: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900L: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900M-GETS-C01: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900M-GETS-XX: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900M-STND-C01: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900M-STND-XX: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS900NC(32M) V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RS900W: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS910: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS910L: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM M2100: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS910W: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS920L: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS920W: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS930L: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS930W: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS940G: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RS969: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG2100: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG2100 (32M) V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG2100 (32M) V5.X: All versions before 5.10.0 RUGGEDCOM M2200: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG2100NC(32M) V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RSG2100P: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG2100P (32M) V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG2100P (32M) V5.X: All versions before 5.10.0 RUGGEDCOM RSG2100PNC (32M) V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RSG2200: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG2288 V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG2288 V5.X: All versions before 5.10.0 RUGGEDCOM RSG2288NC V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RSG2300 V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM M969: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG2300 V5.X: All versions before 5.10.0 RUGGEDCOM RSG2300NC V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RSG2300P V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG2300P V5.X: All versions before 5.10.0 RUGGEDCOM RSG2300PNC V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RSG2488 V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG2488 V5.X: All versions before 5.10.0 RUGGEDCOM RSG2488NC V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RSG907R: All versions before 5.10.0 RUGGEDCOM RSG908C: All versions before 5.10.0 RUGGEDCOM RMC30: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RSG909R: All versions before 5.10.0 RUGGEDCOM RSG910C: All versions before 5.10.0 RUGGEDCOM RSG920P V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) Siemens RUGGEDCOM RSG920P V5.X: All versions before 5.10.0 RUGGEDCOM RSG920PNC V5.X: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RSL910: All versions before 5.10.0 RUGGEDCOM RSL910NC: All versions before 5.10.0 (CVE-2025-41224) RUGGEDCOM RST2228: All versions before 5.10.0 RUGGEDCOM RST2228P: All versions before 5.10.0 RUGGEDCOM RST916C: All versions before 5.10.0 RUGGEDCOM RMC8388 V4.X: All versions (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM RST916P: All versions before 5.10.0 3.2 VULNERABILITY OVERVIEW 3.2.1 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 The affected products support insecure cryptographic algorithms. An attacker could leverage these legacy algorithms to achieve a man-in-the-middle attack or impersonate communicating parties. CVE-2023-52236 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.0 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L). A CVSS v4 score has also been calculated for CVE-2023-52236. A base score of 6.1 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N). 3.2.2 IMPROPER HANDLING OF EXCEPTIONAL CONDITIONS CWE-755 Affected devices do not properly handle malformed TLS handshake messages. This could allow an attacker with network access to the webserver to cause a denial of service resulting in the web server and the device to crash. CVE-2025-41222 has been assigned to this vulnerability. A CVSS v3.1 base score of 5.3 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). A CVSS v4 score has also been calculated for CVE-2025-41222. A base score of 6.9 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N). 3.2.3 USE OF A BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 The affected devices support the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite, which uses CBC (Cipher Block Chaining) mode that is known to be vulnerable to timing attacks. This could allow an attacker to compromise the integrity and confidentiality of encrypted communications. CVE-2025-41223 has been assigned to this vulnerability. A CVSS v3.1 base score of 4.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N). A CVSS v4 score has also been calculated for CVE-2025-41223. A base score of 6.3 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N). 3.2.4 PROTECTION MECHANISM FAILURE CWE-693 The affected products do not properly enforce interface access restrictions when changing from management to non-management interface configurations until a system reboot occurs, despite configuration being saved. This could allow an attacker with network access and credentials to gain access to the device through non-management and maintain SSH access to the device until reboot. CVE-2025-41224 has been assigned to this vulnerability. A CVSS v3.1 base score of 8.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A CVSS v4 score has also been calculated for CVE-2025-41224. A base score of 7.7 has been calculated; the CVSS vector string is (CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N). 3.3 BACKGROUND CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing COUNTRIES/AREAS DEPLOYED: Worldwide COMPANY HEADQUARTERS LOCATION: Germany 3.4 RESEARCHER Thomas Riedmaier from Siemens Energy reported these vulnerabilities to Siemens.
- MITIGATIONS Siemens has released new versions for several affected products and recommends updating to the latest versions. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not yet available: RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100P (32M) V5.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSL910, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P: Update to V5.10.0 or later version. (CVE-2023-52236): Restrict access to port 80/tcp, 443/tcp and 22/tcp to trusted IP addresses only. (CVE-2023-52236, CVE-2025-41222): Deactivate the webserver if not required, and if deactivation is supported by the product. (CVE-2023-52236, CVE-2025-41222): Deactivate the SSH server if not required, and if deactivation is supported by the product. (CVE-2023-52236, CVE-2025-41222, CVE-2025-41223) RUGGEDCOM i800, RUGGEDCOM i801, RUGGEDCOM i802, RUGGEDCOM i803, RUGGEDCOM M2100, RUGGEDCOM M2200, RUGGEDCOM M969, RUGGEDCOM RMC30, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RP110, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600T, RUGGEDCOM RS400, RUGGEDCOM RS401, RUGGEDCOM RS416, RUGGEDCOM RS416P, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000H, RUGGEDCOM RS8000T, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900L, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS969, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100P (32M) V4.X, RUGGEDCOM RSG2200, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG920P V4.X: Currently no fix is available. (CVE-2025-41222): Restrict access to port 80/tcp, 443/tcp and 22/TCP, to trusted IP addresses only. (CVE-2025-41223): Configure the web client to use GCM ciphers; for list of ROS supported cipher suites refer to configuration manual. (CVE-2025-41224) RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RS416NCv2 V5.X, RUGGEDCOM RS416PNCv2 V5.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100PNC (32M) V5.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910NC: Update to V5.10.0 or later version. As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens’ operational guidelines for industrial security and following recommendations in the product manuals. Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage. For more information see the associated Siemens security advisory SSA-083019 in HTML and CSAF. CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet. Locate control system networks and remote devices behind firewalls and isolating them from business networks. When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies. Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents. No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.
- UPDATE HISTORY October 21, 2025: Initial Republication of Siemens ProductCERT SSA-083019