Siemens RUGGEDCOM ROS Devices
Multiple vulnerabilities in Siemens RUGGEDCOM Operating System (ROS) allow attackers to bypass authentication and gain administrative access to industrial network switches. The vulnerabilities include weak cryptographic implementations (CWE-327), improper error handling (CWE-755), and insufficient access controls (CWE-693). Affected devices include over 70 RUGGEDCOM switch models. Only a subset of V5.X firmware versions have patches available; V4.X and earlier versions have no fix planned. Siemens recommends network access restrictions and service deactivation for unpatched devices.
- Network access to ports 22/tcp (SSH), 80/tcp (HTTP), or 443/tcp (HTTPS) on the RUGGEDCOM device
- Device must be on the same network segment or reachable via routed network path
- No valid credentials required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ab11143f-77d9-4036-8ff6-4bffea7b4aedGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.