Siemens RUGGEDCOM ROX (Update A)
Multiple vulnerabilities exist in Siemens RUGGEDCOM ROX devices including command injection, filesystem traversal, and improper privilege management (CWE-269, CWE-250, CWE-280). Affected models include MX5000, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, and RX5000 running firmware versions below 2.14.1. These vulnerabilities could allow an authenticated attacker to escalate privileges to root and take full control of the device, including manipulation of network traffic, routing decisions, and access controls. Siemens has released firmware version 2.14.1 addressing all identified issues.
- Network access to the RUGGEDCOM ROX device management interface (SSH, web interface, or Telnet)
- Valid user account credentials (non-administrative account sufficient due to privilege escalation vulnerabilities)
- Device running firmware version earlier than v2.14.1
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ec4e5f15-4fec-49ec-b1d0-0fc7738b83aaGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.