Siemens RUGGEDCOM APE 1808
Multiple vulnerabilities in the Siemens RUGGEDCOM APE1808 derive from upstream Palo Alto Networks PAN-OS weaknesses in SSH authentication and encryption handling (including CWE-222 incorrect privilege assignment, CWE-924 improper error handling, CWE-20 input validation, CWE-79 cross-site scripting, CWE-787 buffer overflow, CWE-400 resource exhaustion, CWE-77 command injection, and CWE-754 improper exception handling). The device runs PAN-OS software and is vulnerable to SSH cipher bypass and other authentication/authorization flaws. All versions are affected. No vendor patch is currently available, but Siemens recommends SSH profile configuration workarounds and general network isolation measures.
- Network access to SSH management port (typically port 22)
- Valid administrative/high-privilege credentials for device management interface
- Knowledge of upstream PAN-OS SSH cipher weaknesses
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0cb62c7a-0ac7-4344-9396-9f141eb2baaa