Siemens RUGGEDCOM ROX
RUGGEDCOM ROX devices before firmware version 2.16.0 contain multiple high-severity vulnerabilities including weak TLS/SSL configuration (CWE-327, CWE-326), authentication bypass (CWE-287), command injection (CWE-78), buffer overflow (CWE-120), improper input validation (CWE-20), and password handling weaknesses (CWE-276). These issues stem from embedded third-party libraries (curl, OpenSSL) with known CVEs. A network attacker can exploit these to execute arbitrary commands, intercept communications, or crash devices without requiring valid credentials. Siemens has released firmware version 2.16.0 to address these vulnerabilities.
- Network access to the RUGGEDCOM ROX device on its listening ports (typically management/HTTP/HTTPS ports)
- Device running firmware version earlier than 2.16.0
- No authentication required for most vulnerability vectors
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7265d1b3-f0aa-4cdc-a308-45f0ff9dfad5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.