Siemens RUGGEDCOM NMS
Plan Patch8.8ICS-CERT ICSA-17-059-01Feb 28, 2017
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
RUGGEDCOM NMS versions prior to 2.1.0 contain cross-site request forgery (CWE-352) and cross-site scripting (CWE-79) vulnerabilities in the web interface. These vulnerabilities allow a remote attacker to perform unauthorized actions or inject malicious content with high impact on confidentiality, integrity, and availability.
What this means
What could happen
An attacker could execute arbitrary code or inject malicious content on the RUGGEDCOM NMS management system via a cross-site request forgery or cross-site scripting attack, potentially compromising the ability to manage and monitor critical network infrastructure.
Who's at risk
Network management staff and operators at utilities and industrial sites using Siemens RUGGEDCOM NMS to manage ruggedized network equipment (routers, switches, gateways) in substations, water treatment plants, and control centers.
How it could be exploited
An attacker sends a crafted request (CSRF) or injects malicious scripts (XSS) that exploits insufficient request validation and output encoding in the RUGGEDCOM NMS web interface. When a logged-in user views or interacts with the malicious content, the attacker's code executes with the user's privileges, allowing unauthorized actions on managed devices or the NMS itself.
Prerequisites
- Network access to RUGGEDCOM NMS web interface (port 80 or 443)
- User interaction required: an authenticated user must visit a malicious link or page (for CSRF/XSS variants)
remotely exploitablelow complexityuser interaction requiredweb application vulnerability
Exploitability
Low exploit probability (EPSS 0.3%)
Affected products (1)
ProductAffected VersionsFix Status
RUGGEDCOM NMS: All< 2.1.0 (Windows and Linux)2.1.0
Remediation & Mitigation
0/3
Do now
0/1WORKAROUNDRestrict network access to the RUGGEDCOM NMS web interface using a firewall or access control list; allow only authorized management workstations
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate RUGGEDCOM NMS to version 2.1.0 or later
Long-term hardening
0/1HARDENINGImplement network segmentation to isolate the NMS on a dedicated management VLAN separate from field devices and non-essential systems
CVEs (2)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/ec2c3625-5af1-4df9-8923-8bf7502ea304