Siemens RuggedCom ROX-based Devices Certificate Verification Vulnerability (Update A)
Siemens RuggedCom ROX devices fail to properly verify SSL/TLS certificates when establishing secure communications with remote servers. This vulnerability, classified as an improper certificate verification issue (CWE-347), allows an attacker to intercept and forge certificate exchanges, potentially leading to unauthorized access or manipulation of device management traffic. The vulnerability affects ROX 1 devices with firmware versions prior to 1.16.1 and ROX 2 devices with firmware versions prior to 2.6. No vendor patch is currently available for either product line.
- Network access to ROX device management or communication ports
- Ability to intercept or redirect network traffic (ARP spoofing, DNS hijacking, or similar)
- No requirement for valid credentials to perform the attack
/api/v1/advisories/759d1978-57de-4ea2-b942-75b8f94ea1c5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.