CVE-2023-36752

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated privileged remote attackers to execute arbitrary code with root privileges on affected RUGGEDCOM ROX devices. The command injection occurs through the upgrade-app URL parameter in the web interface due to missing server-side input sanitation. All versions below V2.16.0 of multiple RUGGEDCOM ROX router models are affected.

💻 Affected Systems

Products:
  • RUGGEDCOM ROX MX5000
  • RUGGEDCOM ROX MX5000RE
  • RUGGEDCOM ROX RX1400
  • RUGGEDCOM ROX RX1500
  • RUGGEDCOM ROX RX1501
  • RUGGEDCOM ROX RX1510
  • RUGGEDCOM ROX RX1511
  • RUGGEDCOM ROX RX1512
  • RUGGEDCOM ROX RX1524
  • RUGGEDCOM ROX RX1536
  • RUGGEDCOM ROX RX5000
Versions: All versions < V2.16.0
Operating Systems: RUGGEDCOM ROX OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated privileged access to the web interface. Devices in default configurations with web interface enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level access, allowing attackers to install persistent backdoors, exfiltrate sensitive data, disrupt industrial operations, or pivot to other network segments.

🟠

Likely Case

Privileged authenticated attackers gaining full control of affected devices, potentially disrupting critical infrastructure operations or using devices as footholds for lateral movement.

🟢

If Mitigated

Limited impact if proper network segmentation, authentication controls, and monitoring are in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated privileged access. The vulnerability is in a web interface parameter, making it relatively straightforward to exploit once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2.16.0 or later

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-146325.pdf

Restart Required: Yes

Instructions:

1. Download firmware version V2.16.0 or later from Siemens support portal. 2. Backup device configuration. 3. Upload and install the new firmware through the web interface or CLI. 4. Verify successful upgrade and restore configuration if needed.

🔧 Temporary Workarounds

Disable Web Interface

all

Disable the web interface to prevent exploitation through this attack vector

# Via CLI: configure terminal
# disable web-server

Restrict Network Access

all

Limit access to the web interface to trusted management networks only

# Configure firewall rules to restrict access to management IPs
# Example: iptables -A INPUT -p tcp --dport 443 -s trusted_ip -j ACCEPT
# iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from untrusted networks
  • Enforce strong authentication policies and regularly rotate privileged credentials

🔍 How to Verify

Check if Vulnerable:

Check device firmware version through web interface (System > About) or CLI (show version). If version is below V2.16.0, device is vulnerable.

Check Version:

show version

Verify Fix Applied:

Verify firmware version is V2.16.0 or higher. Test the upgrade-app functionality with safe input to ensure proper input validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual upgrade-app parameter values in web server logs
  • Multiple failed authentication attempts followed by successful login and upgrade-app access
  • Commands execution in system logs not initiated by administrators

Network Indicators:

  • Unusual outbound connections from affected devices
  • Traffic patterns indicating command and control activity
  • Unexpected firmware upgrade attempts

SIEM Query:

source="web_logs" AND (url="*upgrade-app*" AND NOT url="*expected_pattern*") OR (event="authentication_success" AND src_ip="untrusted_network" AND subsequent_event="upgrade_app_access")

🔗 References

📤 Share & Export