OTPulse

Remote Code Execution and Denial-of-Service Vulnerability in multiple RUGGEDCOM ROX products

Act Now9.8SSA-594438Mar 8, 2022
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

A vulnerability in the NSS third-party component used by RUGGEDCOM ROX industrial routers allows improper certificate verification. An attacker can send a crafted message with a malformed certificate to a vulnerable device to trigger remote code execution or denial-of-service. The vulnerability affects all models with firmware versions 2.10.0 through 2.14.x.

What this means
What could happen
An attacker with network access to a vulnerable RUGGEDCOM ROX device can run arbitrary code or crash the device, potentially disrupting critical network operations, process control, or communication links between substations, control centers, and field devices.
Who's at risk
Industrial network operators using Siemens RUGGEDCOM ROX industrial routers should care. These devices are commonly deployed in substations, microgrids, and critical infrastructure networks to provide ruggedized network connectivity. Affected models include the MX5000 and RX series (RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, RX5000).
How it could be exploited
The vulnerability is in the certificate verification logic of an embedded third-party library (NSS). An attacker on the network can send a specially crafted message with a malformed certificate to a vulnerable device, bypassing validation checks and triggering memory corruption or code execution. No authentication is required.
Prerequisites
  • Network connectivity to the RUGGEDCOM ROX device on its management or communication port
  • Device running firmware version 2.10.0 through 2.14.x
remotely exploitableno authentication requiredlow complexitymemory corruption vulnerabilityaffects network backbone equipment
Exploitability
Moderate exploit probability (EPSS 5.4%)
Affected products (10)
10 with fix
ProductAffected VersionsFix Status
RUGGEDCOM ROX MX5000≥ V2.10.0 and < V2.15.02.15.0
RUGGEDCOM ROX RX1400≥ V2.10.0 and < V2.15.02.15.0
RUGGEDCOM ROX RX1500≥ V2.10.0 and < V2.15.02.15.0
RUGGEDCOM ROX RX1501≥ V2.10.0 and < V2.15.02.15.0
RUGGEDCOM ROX RX1510≥ V2.10.0 and < V2.15.02.15.0
RUGGEDCOM ROX RX1511≥ V2.10.0 and < V2.15.02.15.0
RUGGEDCOM ROX RX1512≥ V2.10.0 and < V2.15.02.15.0
RUGGEDCOM ROX RX1524≥ V2.10.0 and < V2.15.02.15.0
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate all affected RUGGEDCOM ROX devices to firmware version 2.15.0 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/986a719d-98f0-48b9-8830-4b2f4b6b41e4
Remote Code Execution and Denial-of-Service Vulnerability in multiple RUGGEDCOM ROX products | CVSS 9.8 - OTPulse