Siemens RUGGEDCOM ROS
RUGGEDCOM ROS-based industrial network devices are vulnerable to Slowloris denial-of-service attacks. By sending incomplete HTTP requests continuously to the web interface (port 80/443), an attacker can exhaust all available HTTP connections, preventing legitimate administrative access. The web server recovers once the attack ends. Affected devices include RMC8388, RS416 variants, RS900 variants, RSG2100, RSG2200 variants, RSG2300 variants, RSG2400 variants, RSG900 variants, RSL910, and RST9x6/RST2228 variants. Siemens has released updates to version 5.6.0 or later for patchable models. NC (non-patchable/end-of-life) variants cannot be updated.
- Network access to port 80/tcp or 443/tcp on the affected device
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/63aa5035-1fd1-4c47-a285-87a6fffaae00Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.