OTPulse

Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices

Act Now9.8SSA-366067Mar 12, 2024
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

Fortinet FortiOS contains multiple vulnerabilities in the NGFW implementation affecting Siemens RUGGEDCOM APE1808 devices. The vulnerabilities span multiple CWE categories including insufficient certificate validation (CWE-295), cleartext transmission (CWE-319), path traversal (CWE-22), information disclosure (CWE-200), cross-site scripting (CWE-79), and others. All versions of RUGGEDCOM APE1808 are affected.

What this means
What could happen
An attacker with network access to the RUGGEDCOM APE1808 device could exploit these vulnerabilities to execute arbitrary code, bypass authentication, intercept unencrypted communications, or obtain sensitive configuration data. This could allow complete compromise of the firewall and access to critical network segments it protects.
Who's at risk
Manufacturing facilities and critical infrastructure operators using Siemens RUGGEDCOM APE1808 industrial firewalls should assess their exposure. This device is commonly deployed at network boundaries to protect control systems networks. Any organization running RUGGEDCOM APE1808 for OT network protection is at risk.
How it could be exploited
An unauthenticated attacker on the network can send a specially crafted request to the Fortigate NGFW on the RUGGEDCOM APE1808. Due to insufficient input validation and weak certificate verification, the attacker could execute code, access files via path traversal, or intercept traffic. The vulnerability is remotely exploitable with no user interaction required.
Prerequisites
  • Network access to RUGGEDCOM APE1808 Fortigate NGFW management or data plane ports
  • No authentication required for exploitation of multiple vulnerabilities in the set
Actively exploited (KEV)Remotely exploitableNo authentication requiredLow complexityHigh EPSS score (16.0%)Multiple vulnerability types in single updateAffects network security boundary device
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (1)
ProductAffected VersionsFix Status
RUGGEDCOM APE1808All versions7.4.1
Remediation & Mitigation
0/4
Do now
0/3
HOTFIXUpdate Fortigate NGFW firmware on RUGGEDCOM APE1808 devices to version 7.4.1 or later immediately
HOTFIXContact Siemens/Fortinet customer support for patch delivery and scheduling - coordinate update windows to maintain network segmentation during firmware deployment
WORKAROUNDUntil patched, restrict network access to RUGGEDCOM APE1808 management interfaces to trusted administration sources only via firewall rules or network segmentation
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HARDENINGMonitor Siemens security advisories for additional patch versions being prepared for affected RUGGEDCOM APE1808 deployments
↑↓ Navigate · Esc Close
API: /api/v1/advisories/bef2f9b2-edc8-4bf2-8d3e-799872d8bd52