Siemens RUGGEDCOM APE1808
Siemens RUGGEDCOM APE1808 is affected by vulnerabilities in PAN-OS (Palo Alto Networks). The vulnerabilities include cross-site scripting (CWE-79), information exposure through query strings (CWE-497), OS command injection (CWE-78), improper input sanitization (CWE-83), missing error handling (CWE-754), and improper certificate validation (CWE-295). These vulnerabilities could allow remote attackers without authentication to cause denial of service or potentially execute code on affected devices. Siemens has not planned a fix for RUGGEDCOM APE1808 and is recommending workarounds.
- Network access to the APE1808 management interface (typically port 443 or similar)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e93af268-5302-4672-9d71-cdb8c5e1205aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.