Siemens RUGGEDCOM APE1808
Siemens RUGGEDCOM APE1808 contains multiple vulnerabilities related to Palo Alto Networks PAN-OS, including authentication bypass, information disclosure, command injection, cross-site scripting, and insecure deserialization. The advisory references CWE-406 (authentication bypass), CWE-497 (exposure of sensitive data), CWE-73 (external control of file name), CWE-79 (cross-site scripting), CWE-522 (insufficiently protected credentials), CWE-610 (insecure deserialization), CWE-434 (unrestricted upload of file with dangerous type), and CWE-918 (server-side request forgery). All versions of RUGGEDCOM APE1808 are affected with no fix currently available, though Siemens is preparing updates. Customers should upgrade the Palo Alto Networks Virtual NGFW component to V11.0.1 and implement network isolation and access controls.
- Network access to RUGGEDCOM APE1808 management interface or traffic processing ports
- User interaction may be required (clicking a link or opening content)
- Device running vulnerable firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a3d9dd32-9a5e-4340-88ce-f346016e0600