OTPulse

Siemens RUGGEDCOM APE1808 Devices

Plan Patch8.9ICS-CERT ICSA-26-015-07Jan 13, 2026
Attack VectorNetwork
Auth RequiredLow
ComplexityLow
User InteractionRequired
Summary

Siemens RUGGEDCOM APE1808 devices are affected by path traversal (CWE-22) and cross-site scripting (CWE-79) vulnerabilities in the web management interface. These vulnerabilities could allow authenticated attackers to read arbitrary files on the device or execute malicious scripts. The vulnerabilities affect all versions of the RUGGEDCOM APE1808. Siemens is preparing fix versions but they are not yet available.

What this means
What could happen
An authenticated attacker with local network access to the RUGGEDCOM APE1808 device could perform path traversal or cross-site scripting attacks, potentially leading to unauthorized access to device configuration, modification of security settings, or execution of malicious scripts on the device's web interface.
Who's at risk
Manufacturing facilities using Siemens RUGGEDCOM APE1808 devices for network management and access point control should be aware of these vulnerabilities. This includes industrial automation environments, power distribution networks, and process control systems that rely on these ruggedized communication devices for remote management.
How it could be exploited
An attacker with credentials and access to the device's web interface could exploit path traversal (CWE-22) to read arbitrary files on the device, or inject malicious scripts (CWE-79) that execute in the context of other users' browsers when they access the management interface. This could allow the attacker to extract sensitive configuration, modify firewall rules, or disrupt device operation.
Prerequisites
  • Valid credentials for the RUGGEDCOM APE1808 web management interface
  • Network access to the device's HTTP/HTTPS management port
  • User interaction required (victim must visit the compromised web interface)
Requires authentication but low attack complexityWeb-based attack vectorCross-site scripting and path traversal possibleNo patch currently availableHigh CVSS score (8.9)
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
RUGGEDCOM APE1808All versionsNo fix (EOL)
Remediation & Mitigation
0/3
Do now
0/1
WORKAROUNDRestrict network access to the RUGGEDCOM APE1808 management interface to trusted engineering networks only
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXContact Siemens customer support for patch and update information
Mitigations - no patch available
0/1
RUGGEDCOM APE1808 has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGImplement network segmentation to isolate the device from general corporate networks
↑↓ Navigate · Esc Close
API: /api/v1/advisories/d6577780-b551-42b5-902f-fcdc3ef7259f