Siemens RUGGEDCOM ROS
RUGGEDCOM ROS-based devices are vulnerable to a Slowloris denial of service attack on the web server. An attacker can send a continuous stream of incomplete HTTP requests to ports 80/TCP or 443/TCP, consuming all available web server connections and making the web interface unresponsive. The affected web server recovers automatically once the attack ends. This affects approximately 100 device variants across the RUGGEDCOM switch and router product families. Siemens has released firmware updates (version 4.3.8 for V4.X models, 5.6.0 for V5.X models) for standard variants, but non-configurable (NC) and factory-hardened (F) variants have no fix available.
- Network access to port 80/TCP or 443/TCP on the device
- Web server must be enabled on the device (default configuration)
- No authentication required to send HTTP requests
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0eac3596-e659-40d6-aeb9-233f805010a7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.