Siemens RUGGEDCOM APE1808 with Fortigate NGFW Devices
Fortinet FortiOS contains multiple critical vulnerabilities affecting Fortigate NGFW devices. CVE-2023-25610 allows unauthenticated access to the administrative interface; CVE-2023-27997 affects SSL-VPN functionality; CVE-2023-33308 affects HTTP/2 handling in SSL inspection. These vulnerabilities allow remote attackers to bypass authentication, intercept encrypted traffic, or execute arbitrary code. RUGGEDCOM APE1808 devices protected by affected Fortigate firewalls may be exposed if the firewall is compromised. Siemens has issued firmware updates for Fortigate NGFW to version 7.4.1. No patch is currently available for RUGGEDCOM APE1808 itself, but Siemens is preparing additional fixes and recommends implementing network segmentation and administrative access controls.
- Network access to the Fortigate NGFW administrative interface (ports 80, 443, or SSL-VPN port)
- No authentication required for some vectors (CVE-2023-25610)
- NGFW must have HTTP/HTTPS admin interface enabled or SSL-VPN enabled
- HTTP/2 support enabled on SSL inspection profiles
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f1244e32-c004-4206-be2c-3fe77b2dbeae