Siemens RUGGEDCOM APE1808
Siemens RUGGEDCOM APE1808LNX and APE1808LNX CC devices are affected by an improper access control vulnerability (CWE-863). The issue stems from related vulnerabilities in Nozomi Guardian/CMC monitoring software versions prior to 24.2.0. An authenticated attacker could access the device and bypass authorization controls to read or modify sensitive configuration data. Both affected RUGGEDCOM models have reached end-of-life status and will not receive direct firmware patches. Siemens recommends upgrading the associated Nozomi Guardian/CMC management software to version 24.3.1, restricting access to trusted personnel, and implementing proper network isolation and access controls.
- Valid login credentials for RUGGEDCOM APE1808 management interface
- Network access to the RUGGEDCOM APE1808 (port and protocol depend on deployment configuration)
- Device must be reachable from attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/55d69509-eccc-4558-abfd-792520e6ee89Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.