Ruggedcom ROS Hard-Coded RSA SSL Private Key
Siemens Ruggedcom devices use a hard-coded RSA SSL private key embedded in the device firmware. This private key is not unique per device and is the same across all affected units. The vulnerability affects Rugged OS (versions 3.11 and earlier), ROX I OS used in RX1000/RX1100 series (versions ROX_v1.14.5 and earlier), ROX II OS used in RX5000/RX1500 series (versions ROX_v2.3.0 and earlier), and RuggedMax Operating System used in Win7000, Win7200, Win5100, and Win5200 products (versions 4.2.1.4621.22 and earlier). An attacker with the private key could decrypt SSL communications, impersonate devices, or conduct man-in-the-middle attacks against management interfaces.
- Access to the device firmware (via download or physical access)
- Knowledge of the hard-coded private key (publicly available)
- Network access to the device's HTTPS/SSL management interface
/api/v1/advisories/96ced1f7-1df2-4cdb-91c1-5e63c8c6196bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.