Siemens RUGGEDCOM APE1808 devices configured with Palo Alto Networks Virtual NGFW
CVE-2024-3400 in Palo Alto Networks PAN-OS affects Siemens RUGGEDCOM APE1808 devices when configured with Palo Alto Networks Virtual NGFW and GlobalProtect gateway or GlobalProtect portal enabled. The vulnerability allows remote code execution without authentication. Siemens recommends updating to the latest version of the Palo Alto Networks Virtual NGFW for RUGGEDCOM APE1808. As a workaround, disable GlobalProtect gateway and portal if not required (they are disabled by default), and customers with Threat Prevention can block attacks using specific threat IDs. Immediate network access restrictions are recommended.
- Network reachability to the RUGGEDCOM APE1808 on its management/GlobalProtect interface (typically ports 443, 8443, or 3956)
- GlobalProtect gateway and/or GlobalProtect portal must be enabled on the device (disabled by default)
- No authentication credentials required
/api/v1/advisories/306802f3-0e6a-407b-b7b8-f209733959c8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.