CVE-2024-39675

8.8 HIGH

📋 TL;DR

This vulnerability in Siemens RUGGEDCOM industrial networking devices incorrectly enables the Modbus service in non-managed VLANs, potentially exposing serial communication interfaces to unauthorized network access. It affects multiple RUGGEDCOM switch and router models running outdated firmware versions. Only serial devices connected to these products are vulnerable.

💻 Affected Systems

Products:
  • RUGGEDCOM RMC30
  • RUGGEDCOM RMC30NC
  • RUGGEDCOM RP110
  • RUGGEDCOM RP110NC
  • RUGGEDCOM RS400
  • RUGGEDCOM RS400NC
  • RUGGEDCOM RS401
  • RUGGEDCOM RS401NC
  • RUGGEDCOM RS416
  • RUGGEDCOM RS416NC
  • RUGGEDCOM RS416NCv2
  • RUGGEDCOM RS416P
  • RUGGEDCOM RS416PNC
  • RUGGEDCOM RS416PNCv2
  • RUGGEDCOM RS416Pv2
  • RUGGEDCOM RS416v2
  • RUGGEDCOM RS910
  • RUGGEDCOM RS910L
  • RUGGEDCOM RS910LNC
  • RUGGEDCOM RS910NC
  • RUGGEDCOM RS910W
  • RUGGEDCOM RS920L
  • RUGGEDCOM RS920LNC
  • RUGGEDCOM RS920W
Versions: V4.X versions < V4.3.10, V5.X versions < V5.9.0
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects serial devices connected to these products. Vulnerability occurs in specific configurations where Modbus service is incorrectly enabled in non-managed VLANs.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain unauthorized access to industrial serial devices via Modbus protocol, potentially allowing manipulation of industrial processes, data exfiltration, or disruption of critical infrastructure operations.

🟠

Likely Case

Unauthorized network access to serial devices through exposed Modbus interfaces, potentially enabling reconnaissance, data monitoring, or limited manipulation of industrial equipment.

🟢

If Mitigated

With proper network segmentation and access controls, the risk is limited to internal network segments where attackers would need additional access.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to affected VLANs. No authentication needed for Modbus service access once exposed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V4.3.10 for V4.X devices, V5.9.0 for V5.X devices

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-170375.html

Restart Required: Yes

Instructions:

1. Download firmware update from Siemens support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or CLI. 4. Reboot device. 5. Verify firmware version and configuration.

🔧 Temporary Workarounds

Disable Modbus in non-managed VLANs

all

Manually configure VLAN settings to ensure Modbus service is only enabled in properly managed VLANs

configure terminal
interface vlan [vlan-id]
no modbus enable
end
write memory

Implement network segmentation

all

Isolate affected devices and serial networks from general corporate networks using firewalls and VLAN segmentation

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to affected VLANs
  • Monitor network traffic for unauthorized Modbus protocol access attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI using 'show version' command and compare against patched versions

Check Version:

show version

Verify Fix Applied:

Verify firmware version is V4.3.10 or higher for V4.X devices, or V5.9.0 or higher for V5.X devices

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Modbus service
  • Modbus protocol traffic from unexpected network segments
  • Configuration changes to VLAN or Modbus settings

Network Indicators:

  • Modbus TCP traffic (port 502) from unauthorized network segments
  • Unexpected serial device communication patterns

SIEM Query:

source_ip IN (industrial_network_subnets) AND dest_port=502 AND protocol=TCP

🔗 References

📤 Share & Export