Siemens RUGGEDCOM APE1808 Devices
Siemens RUGGEDCOM APE1808 devices running Nozomi Guardian/CMC software versions before V22.6.3 and 23.1.0 contain SQL injection (CWE-89) and improper input validation (CWE-20) vulnerabilities in the web management interface. These allow an unauthenticated network attacker to potentially execute arbitrary commands, extract configuration data, or modify device settings. Siemens is preparing firmware updates but has not yet released patches for all affected products. Immediate mitigation is available through firewall access controls and network segmentation.
- Network access to the web management interface port on RUGGEDCOM APE1808
- Device running Nozomi Guardian/CMC software version prior to V22.6.3 or 23.1.0
- No valid authentication credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8942606a-b796-4c24-9c38-c5d174f47935Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.