Siemens RUGGEDCOM ROS
Multiple vulnerabilities affect third-party components in the RUGGEDCOM Operating System (ROS). These include issues in the web server (CWE-79 cross-site scripting, CWE-208 observable timing discrepancy, CWE-358 improperly restricted operations within bounds of memory buffer, CWE-122 heap-based buffer overflow, CWE-190 integer overflow, CWE-754 improper check for unusual or exceptional conditions). An attacker could cause denial-of-service, perform man-in-the-middle attacks, retrieve sensitive information, or gain privileged functions on affected RUGGEDCOM devices.
- Network access to affected RUGGEDCOM device on port 80, 443 (web), or port 69/UDP (TFTP)
- No authentication required for exploitation of web server or TFTP vulnerabilities
- Affected firmware version must be running on the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9ec7ae12-1165-4e2e-a2b3-92117cb938a0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.