Siemens RUGGEDCOM and SCALANCE M-800/S615 Family
Multiple vulnerabilities in Siemens SCALANCE M-800 family and RUGGEDCOM RM1224 LTE routers before version 8.0 allow an administrator with high-level access to execute arbitrary commands on the device, bypass authentication mechanisms, generate weak encryption keys for secure communications, and manipulate network traffic. Affected devices include models used for ADSL/SHDSL remote connectivity, cellular LAN routing, and industrial Ethernet access. Siemens has released firmware version 8.0 for most products, but some devices have no patch available.
- Administrative or high-privilege credentials to access the device management interface
- Network reachability to the device's management port
- Knowledge of specific vulnerable configuration options or feature combinations
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b1c9f499-cac8-466c-8a92-3b8b8d4f1e64Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.