Siemens RUGGEDCOM ROX II
RUGGEDCOM ROX II devices contain Client-Side Enforcement of Server-Side Security vulnerabilities (CWE-602) in the web interface. An attacker with legitimate privileged credentials could bypass client-side security checks and execute arbitrary code with OS-level privileges on the underlying operating system. This affects RUGGEDCOM ROX MX5000, MX5000RE, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, and RX5000 series devices running firmware versions below 2.16.5. Siemens has released firmware version 2.16.5 as a fix for all affected models.
- Valid privileged web interface account credentials (engineering or administrator role)
- Network access to the web interface (typically HTTP/HTTPS port on the device)
- Vulnerable firmware version below 2.16.5
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c1f97c7d-a48e-4a0b-a68d-50a515549ee8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.