CVE-2023-36750

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated privileged remote attackers to execute arbitrary code with root privileges on affected RUGGEDCOM ROX devices. The command injection occurs in the software-upgrade URL parameter due to insufficient input validation. All versions below V2.16.0 of multiple RUGGEDCOM ROX router models are affected.

💻 Affected Systems

Products:
  • RUGGEDCOM ROX MX5000
  • RUGGEDCOM ROX MX5000RE
  • RUGGEDCOM ROX RX1400
  • RUGGEDCOM ROX RX1500
  • RUGGEDCOM ROX RX1501
  • RUGGEDCOM ROX RX1510
  • RUGGEDCOM ROX RX1511
  • RUGGEDCOM ROX RX1512
  • RUGGEDCOM ROX RX1524
  • RUGGEDCOM ROX RX1536
  • RUGGEDCOM ROX RX5000
Versions: All versions < V2.16.0
Operating Systems: Device-specific firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated privileged access to the web interface

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level access, allowing attackers to install persistent backdoors, disrupt industrial operations, or pivot to other network segments.

🟠

Likely Case

Unauthorized code execution leading to data exfiltration, network reconnaissance, or disruption of industrial control systems.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent attackers from reaching the vulnerable interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated privileged access but command injection is straightforward once access is obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2.16.0

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-146325.pdf

Restart Required: Yes

Instructions:

1. Download firmware version V2.16.0 or later from Siemens support portal. 2. Backup device configuration. 3. Upload new firmware via web interface or CLI. 4. Apply firmware update. 5. Reboot device. 6. Verify version is V2.16.0 or higher.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to the web interface to only trusted management networks

Authentication Hardening

all

Implement strong authentication policies and limit privileged accounts

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from untrusted networks
  • Monitor and audit privileged account usage on affected devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI. If version is below V2.16.0, device is vulnerable.

Check Version:

show version

Verify Fix Applied:

Verify firmware version is V2.16.0 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual software upgrade attempts
  • Multiple failed authentication attempts followed by successful privileged login
  • Unexpected command execution in system logs

Network Indicators:

  • Unusual outbound connections from industrial devices
  • Traffic to/from device management interfaces from unexpected sources

SIEM Query:

source="industrial-device-logs" AND (event="software-upgrade" OR event="command-execution") AND user="privileged"

🔗 References

📤 Share & Export