Siemens RUGGEDCOM APE1808
RUGGEDCOM APE1808 contains multiple critical vulnerabilities in the embedded Palo Alto Networks Virtual NGFW, including memory buffer overflows (CWE-787), integer overflows (CWE-190), improper input validation (CWE-20), and weak SSH cipher configuration (CVE-2023-48795). These flaws allow unauthenticated remote attackers to execute arbitrary code, bypass authentication, escalate privileges, or inject malicious content. The vulnerabilities span 19 different weakness classes including use-after-free (CWE-416), weak access controls (CWE-269, CWE-282), insufficient encryption (CWE-326, CWE-312), and missing null pointer checks (CWE-476). All versions of RUGGEDCOM APE1808 are affected.
- Network reachability to the RUGGEDCOM APE1808 management interface or data plane ports
- For CVE-2023-48795: SSH access enabled with weak cipher/MAC configurations
- No special credentials required for most vulnerabilities (CWE-20, CWE-269, CWE-787 indicate unauthenticated flaws)
/api/v1/advisories/9891ab09-8426-4db3-85d7-8ed0161da495Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.