Siemens RUGGEDCOM ROX II
Multiple vulnerabilities in Siemens RUGGEDCOM ROX II industrial networking devices (models MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX5000) allow remote code execution. The vulnerabilities stem from improper input validation (CWE-20), null pointer dereference (CWE-476), buffer overflow (CWE-787), missing cryptographic validation (CWE-295), and other weaknesses. An unauthenticated attacker with network access can send specially crafted input to the device to trigger the vulnerability and gain full code execution, potentially compromising the device's ability to route traffic, maintain secure tunnels, or enforce firewall policies.
- Network reachability to the RUGGEDCOM ROX device over its management or data interface
- No authentication required
- Device running firmware version before 2.14.0
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0e581ddd-6da3-4c5c-bdaf-1a7bbd118517Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.