CVE-2023-37372

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to execute arbitrary SQL queries on RUGGEDCOM CROSSBOW server databases. It affects all versions before V5.4, potentially exposing sensitive data and system control. Organizations using these industrial network management systems are at risk.

💻 Affected Systems

Products:
  • RUGGEDCOM CROSSBOW
Versions: All versions < V5.4
Operating Systems: Not specified - application-specific vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the CROSSBOW network management system used with RUGGEDCOM industrial networking devices.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, system manipulation, and potential lateral movement to connected industrial control systems.

🟠

Likely Case

Data exfiltration of sensitive configuration information, user credentials, and network topology details.

🟢

If Mitigated

Limited impact with proper network segmentation and database permissions, though SQL injection remains possible.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, unauthenticated access allows attackers with network foothold to exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity, especially with unauthenticated access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V5.4

Vendor Advisory: https://cert-portal.siemens.com/productcert/pdf/ssa-472630.pdf

Restart Required: Yes

Instructions:

1. Download RUGGEDCOM CROSSBOW V5.4 from Siemens support portal. 2. Backup current configuration and database. 3. Install the update following vendor documentation. 4. Restart the CROSSBOW application/services.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate CROSSBOW systems from untrusted networks and internet access

Access Control

all

Implement strict firewall rules to limit access to CROSSBOW web interface

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection protection rules
  • Monitor database queries for suspicious patterns and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check CROSSBOW version in web interface or application settings. If version is below V5.4, system is vulnerable.

Check Version:

Check via CROSSBOW web interface: Login > System Information > Version

Verify Fix Applied:

Confirm version is V5.4 or higher in application settings and test SQL injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed login attempts followed by SQL-like requests
  • Unexpected database schema changes

Network Indicators:

  • SQL keywords in HTTP requests to CROSSBOW endpoints
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND (url="*CROSSBOW*" OR app="CROSSBOW") AND (request="*SELECT*" OR request="*UNION*" OR request="*INSERT*" OR request="*DELETE*")

🔗 References

📤 Share & Export