Siemens RUGGEDCOM
Multiple information disclosure vulnerabilities (CVE-2024-39675, CVE-2023-52237, CVE-2024-38278, CVE-2023-52238) in the RUGGEDCOM Operating System affect managed industrial network switches. These vulnerabilities expose confidential system configuration data, credentials, and other sensitive information through unprotected management and diagnostic interfaces. Affected products include RUGGEDCOM RS-series, RSG-series, RSL-series, RST-series, and i800/M2100/M2200/M969/RMC/RP variants running firmware versions before V4.3.10 (V4 series) or V5.9.0 (V5 series). A number of legacy models (RS900L, RS910L, RS920L/W, RS930L, RS930W, RS969 series) have no fix available.
- Network access to the RUGGEDCOM device on the same subnet or via routed network path
- No authentication required for affected management interfaces or diagnostic functions
- Device must be running a vulnerable firmware version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/508075cf-33fd-489a-befb-9266cba59d0dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.