Siemens Ruggedcom WIN Vulnerability
Siemens Ruggedcom WIN industrial routers contain multiple authentication bypass (CWE-287), buffer overflow (CWE-121), and credential exposure (CWE-257) vulnerabilities. WIN51xx, WIN52xx, WIN70xx, and WIN72xx devices with firmware versions below the specified thresholds are vulnerable. These devices are commonly deployed in power substations and remote terminal units to provide industrial Ethernet connectivity and network bridging. Exploitation could allow an attacker to bypass device authentication, crash the device or execute code, or extract plaintext credentials for lateral movement within the control network.
- Network access to the Siemens Ruggedcom WIN device (IP connectivity on management or operational ports)
- No authentication required for initial exploitation of CWE-287 or CWE-121
- Device running vulnerable firmware version (SS4.4.4624.35 for WIN51xx/52xx, BS4.4.4621.32 for WIN70xx/72xx or older)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b1bf9ddb-ec4e-4119-ad1f-2ea768bed8f5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.