Code Injection Vulnerability in RUGGEDCOM ROS
RUGGEDCOM ROS-based industrial Ethernet switches contain a code injection vulnerability accessible through the command-line interface (CLI). An authenticated user with CLI access could inject malicious code that is executed by the device, potentially leading to complete compromise of the switch and the networks it connects. The vulnerability affects multiple RUGGEDCOM product lines including M969, M2100, M2200, RS400, RS401, RS416, RS900, RS910, RS920, RS930, RS940, RS1600, RS8000, RMC, RP110, RSG, RSL, and RST series devices. Siemens has released firmware updates (v4.3.8 for v4.x branch and v5.6.0 for v5.x branch) for most affected products, but 13 product variants are end-of-life with no fix planned.
- Valid CLI authentication credentials (username and password or SSH key)
- Network access to the RUGGEDCOM device CLI port (typically SSH on port 22 or Telnet on port 23)
- Affected firmware version running on the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ac0db115-151b-4276-8019-ac4a51e06895