Vulnerability in RUGGEDCOM Discovery Protocol (RCDP) of Industrial Communication Devices
The RUGGEDCOM RCDP (RUGGEDCOM Discovery Protocol) on RUGGEDCOM ROS-based devices and certain SCALANCE X managed switches is not properly configured by default after commissioning. This allows unauthenticated remote users in the same adjacent network to perform administrative operations on the device, such as modifying network settings, changing configurations, or disrupting communications. An attacker must be on the same network segment and the RCDP daemon must be enabled. The vulnerability affects a wide range of RUGGEDCOM industrial routers and SCALANCE switches used in manufacturing and infrastructure networks. Siemens has released patched firmware versions for all affected products.
- Access to the same adjacent network segment as the vulnerable device
- RCDP daemon enabled on the target device
- Target device running a firmware version below the patched version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/444aaba4-83b1-433a-bba8-dbb5f40f5ca5