Siemens SIMATIC RTLS Gateways
Siemens SIMATIC RTLS Gateway models (RTLS4030G and RTLS4430G) are affected by TCP/IP stack vulnerabilities disclosed as "Ripple20" by JSOF research. These vulnerabilities allow an attacker on the adjacent network segment to potentially execute code on the gateway device without authentication. The vulnerabilities affect all versions of the affected products, and no vendor fix is currently available. Siemens recommends protecting network access through appropriate mechanisms and following operational security guidelines.
- Adjacent network access (same LAN segment, WiFi network, or wired connection to the same switch)
- Network path to the RTLS Gateway device
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/efa3c542-8870-44c1-8d99-0221c3e99cc4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.