Siemens RUGGEDCOM ROX II
RUGGEDCOM ROX II devices do not properly restrict access to Built-In-Self-Test (BIST) mode, which can be entered during boot. The BIST mode does not properly enforce authentication, allowing a local attacker with physical access to bypass authentication and obtain root shell access to the device. Affected products include RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1536, RX5000, MX5000, and MX5000RE models, all firmware versions. Siemens is preparing firmware updates and recommends implementing compensating controls until patches are available.
- Physical access to the device during or before boot
- Ability to interrupt normal boot sequence
- Knowledge of BIST mode entry procedure
Patching may require device reboot — plan for process interruption
/api/v1/advisories/218c18a9-185f-4941-9d8f-d562456555d2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.