Siemens RUGGEDCOM APE180
Multiple vulnerabilities exist in Nozomi Networks Guardian/CMC software before version V22.6.2, affecting the Siemens RUGGEDCOM APE1808 device. The issues include SQL injection (CWE-89), cross-site scripting (CWE-79), improper input validation (CWE-20), broken access controls (CWE-863), and cross-site request forgery (CWE-384). An authenticated attacker can read sensitive data from the management interface, bypass authorization controls, or perform unauthorized actions via forged requests. Siemens has not yet released firmware patches and recommends firewall restrictions and secure session practices as mitigations.
- Valid user credentials for the web management interface
- Network access to the APE1808 web management port
- Target user must have an active browser session (for CSRF attacks)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6a6d1506-b0d2-4232-a55c-c96cbc215203Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.