CVE-2025-33023

4.1 MEDIUM

📋 TL;DR

This vulnerability allows authenticated remote attackers with high privileges to upload arbitrary files through the web interface of affected RUGGEDCOM ROX devices. The improper file upload restriction could lead to system compromise. All versions of multiple RUGGEDCOM ROX MX and RX series devices are affected.

💻 Affected Systems

Products:
  • RUGGEDCOM ROX MX5000
  • RUGGEDCOM ROX MX5000RE
  • RUGGEDCOM ROX RX1400
  • RUGGEDCOM ROX RX1500
  • RUGGEDCOM ROX RX1501
  • RUGGEDCOM ROX RX1510
  • RUGGEDCOM ROX RX1511
  • RUGGEDCOM ROX RX1512
  • RUGGEDCOM ROX RX1524
  • RUGGEDCOM ROX RX1536
  • RUGGEDCOM ROX RX5000
Versions: All versions
Operating Systems: Device-specific firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated attacker with high privileges in web interface

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could upload malicious files leading to remote code execution, system takeover, or persistent backdoor installation.

🟠

Likely Case

Attackers could upload configuration files, scripts, or web shells to gain further access or disrupt operations.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the affected device's functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires valid high-privilege credentials and web interface access

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Siemens advisory for specific patched versions

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-665108.html

Restart Required: No

Instructions:

1. Review Siemens advisory SSA-665108 2. Apply recommended firmware updates 3. Verify patch installation

🔧 Temporary Workarounds

Restrict web interface access

all

Limit access to device web interfaces to trusted networks only

Implement strong authentication controls

all

Enforce complex passwords, multi-factor authentication, and regular credential rotation

🧯 If You Can't Patch

  • Segment affected devices on isolated network segments
  • Implement strict access controls and monitor for suspicious file upload activities

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Siemens advisory SSA-665108

Check Version:

Check device web interface or CLI for firmware version information

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activities in web interface logs
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected file transfers to device web interface
  • Suspicious HTTP POST requests to upload endpoints

SIEM Query:

source="device_logs" AND (event="file_upload" OR event="POST /upload")

🔗 References

📤 Share & Export