OTPulse

Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.7

Plan Patch8.3SSA-994087Aug 12, 2025
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

RUGGEDCOM CROSSBOW Station Access Controller (SAC) contains multiple vulnerabilities in the integrated SQLite component. These vulnerabilities could allow an attacker to execute arbitrary code or create a denial of service condition. The vulnerabilities stem from improper input validation in the SQLite integration, enabling code execution or resource exhaustion attacks.

What this means
What could happen
An attacker with network access to the RUGGEDCOM CROSSBOW SAC could execute arbitrary code on the device, potentially allowing them to modify access control policies, capture credentials, or disrupt station authentication and access logging. Alternatively, they could crash the device causing a denial of service that blocks legitimate access to controlled systems.
Who's at risk
This vulnerability affects organizations using RUGGEDCOM CROSSBOW Station Access Controller (SAC) for industrial network access control and authentication. Water authorities, electric utilities, and other critical infrastructure operators relying on this device for managing controlled access to operational networks should prioritize this update. The SAC is typically deployed at critical points in the OT network where it controls access to supervisory and control systems.
How it could be exploited
An attacker sends a specially crafted network request to the RUGGEDCOM CROSSBOW SAC that exploits the SQLite vulnerability. The device processes the malicious input without proper validation, allowing the attacker to execute arbitrary SQL commands or inject code that runs with the SAC's privileges.
Prerequisites
  • Network access to the RUGGEDCOM CROSSBOW SAC on the port it listens on for client connections
  • No authentication required to trigger the vulnerability
  • Device must be running firmware version before V5.7
remotely exploitableno authentication requiredlow complexityaffects access control systems
Exploitability
Low exploit probability (EPSS 0.7%)
Affected products (1)
ProductAffected VersionsFix Status
RUGGEDCOM CROSSBOW Station Access Controller (SAC)< 5.75.7
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate RUGGEDCOM CROSSBOW Station Access Controller (SAC) to firmware version 5.7 or later
↑↓ Navigate · Esc Close
API: /api/v1/advisories/9a73ddf4-8f81-4db3-a373-ea8142f1fb49
Multiple SQLite Vulnerabilities in RUGGEDCOM CROSSBOW Station Access Controller Before V5.7 | CVSS 8.3 - OTPulse