Siemens RUGGEDCOM ROS
A vulnerability in Siemens RUGGEDCOM ROS devices with mirror port enabled allows an attacker to inject information into the network via the mirror port. The vulnerability affects industrial Ethernet switches and managed switch products across multiple RUGGEDCOM series (i800, M2100, M2200, RS400, RS900, RS1600, RS8000, RSG2100, RSG2200, RSG2300, RSG2488, and others). Siemens has released firmware updates for some affected products and is preparing further updates. For products without planned fixes, specific countermeasures are recommended.
- Network access to the mirror port of the RUGGEDCOM device
- Mirror port feature enabled on the switch
- Device running vulnerable firmware version (varies by model; most versions before 4.3.8 or 5.8.0)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2fa3a260-2c2b-4c84-ab4b-54147446790bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.