Siemens RUGGEDCOM APE1808
Multiple vulnerabilities exist in Siemens RUGGEDCOM APE1808 industrial managed switch, including command injection (CWE-78), insufficient access controls (CWE-250, CWE-863), path traversal (CWE-22), SQL injection (CWE-89), and cross-site scripting (CWE-79). These flaws could allow an authenticated attacker with network access to execute arbitrary commands, modify device configuration, or gain unauthorized control over the switch. The advisory indicates Siemens is developing patches and recommends users contact customer support for update information.
- Valid login credentials for the device management interface
- Network access to the RUGGEDCOM APE1808 management port (typically HTTP/HTTPS)
- Ability to reach the device from an authenticated network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1129b1a2-8d54-4b96-b110-0a36f9adee66Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.