Siemens RUGGEDCOM ROS Devices
A denial of service vulnerability in the web server of Siemens RUGGEDCOM network devices allows an unauthorized attacker to cause total loss of web server availability. When exploited, the vulnerability exhausts resources and prevents the device from accepting new connections, rendering it unmanageable until restarted. The vulnerability affects industrial Ethernet switches and routers in the RUGGEDCOM i8xx, M-series, RMC, RP, RS, RSG, and RSL product lines running firmware versions prior to 4.3.8 (V4.X) or 5.8.0 (V5.X). Siemens has released firmware updates for most products but has not provided fixes for end-of-life variants marked with the F suffix.
- Network access to the RUGGEDCOM device's web server port (typically port 80/443)
- No authentication required
- Device must be running a vulnerable firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/da773ff6-3bd9-4941-a5c0-66e024119e10Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.