CVE-2025-41223

4.8 MEDIUM

📋 TL;DR

This vulnerability affects multiple RUGGEDCOM industrial networking devices that support the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite. The CBC mode in this cipher suite is vulnerable to timing attacks, potentially allowing attackers to decrypt encrypted communications and compromise data integrity and confidentiality. All listed RUGGEDCOM devices are affected unless specifically patched.

💻 Affected Systems

Products:
  • RUGGEDCOM i800
  • RUGGEDCOM i801
  • RUGGEDCOM i802
  • RUGGEDCOM i803
  • RUGGEDCOM M2100
  • RUGGEDCOM M2200
  • RUGGEDCOM M969
  • RUGGEDCOM RMC30
  • RUGGEDCOM RMC8388
  • RUGGEDCOM RP110
  • RUGGEDCOM RS1600
  • RUGGEDCOM RS1600F
  • RUGGEDCOM RS1600T
  • RUGGEDCOM RS400
  • RUGGEDCOM RS401
  • RUGGEDCOM RS416
  • RUGGEDCOM RS416P
  • RUGGEDCOM RS416Pv2
  • RUGGEDCOM RS416v2
  • RUGGEDCOM RS8000
  • RUGGEDCOM RS8000A
  • RUGGEDCOM RS8000H
  • RUGGEDCOM RS8000T
  • RUGGEDCOM RS900
  • RUGGEDCOM RS900G
  • RUGGEDCOM RS900GP
  • RUGGEDCOM RS900L
  • RUGGEDCOM RS900M-GETS-C01
  • RUGGEDCOM RS900M-GETS-XX
  • RUGGEDCOM RS900M-STND-C01
  • RUGGEDCOM RS900M-STND-XX
  • RUGGEDCOM RS900W
  • RUGGEDCOM RS910
  • RUGGEDCOM RS910L
  • RUGGEDCOM RS910W
  • RUGGEDCOM RS920L
  • RUGGEDCOM RS920W
  • RUGGEDCOM RS930L
  • RUGGEDCOM RS930W
  • RUGGEDCOM RS940G
  • RUGGEDCOM RS969
  • RUGGEDCOM RSG2100
  • RUGGEDCOM RSG2100P
  • RUGGEDCOM RSG2200
  • RUGGEDCOM RSG2288
  • RUGGEDCOM RSG2300
  • RUGGEDCOM RSG2300P
  • RUGGEDCOM RSG2488
  • RUGGEDCOM RSG907R
  • RUGGEDCOM RSG908C
  • RUGGEDCOM RSG909R
  • RUGGEDCOM RSG910C
  • RUGGEDCOM RSG920P
  • RUGGEDCOM RSL910
  • RUGGEDCOM RST2228
  • RUGGEDCOM RST2228P
  • RUGGEDCOM RST916C
  • RUGGEDCOM RST916P
Versions: All versions for most products, V5.X versions < V5.10.0 for some products
Operating Systems: Embedded industrial OS
Default Config Vulnerable: ⚠️ Yes
Notes: Devices are vulnerable if using the affected cipher suite. Some products have version-specific vulnerabilities (V5.X < V5.10.0).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could decrypt sensitive industrial control system communications, potentially gaining access to operational technology networks, manipulating industrial processes, or stealing proprietary data.

🟠

Likely Case

Skilled attackers could intercept and decrypt encrypted traffic between devices, potentially gaining unauthorized access to network segments or sensitive operational data.

🟢

If Mitigated

With proper network segmentation and monitoring, impact would be limited to potential data exposure from intercepted communications.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access and ability to intercept TLS traffic. Timing attacks against CBC mode are well-documented but require specific conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V5.10.0 or later for affected V5.X products

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-083019.html

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download V5.10.0 or later from Siemens support portal. 3. Backup device configuration. 4. Apply firmware update following vendor documentation. 5. Verify update and restore configuration if needed.

🔧 Temporary Workarounds

Disable vulnerable cipher suite

all

Remove TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 from enabled cipher suites

Consult device-specific configuration guide for cipher suite management

Network segmentation

all

Isolate affected devices in separate network segments with strict access controls

🧯 If You Can't Patch

  • Implement strict network segmentation to limit exposure
  • Deploy network monitoring and intrusion detection for TLS traffic anomalies

🔍 How to Verify

Check if Vulnerable:

Check device firmware version and verify if TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite is enabled

Check Version:

Device-specific CLI command (varies by product) - typically 'show version' or similar

Verify Fix Applied:

Verify firmware version is V5.10.0 or later and vulnerable cipher suite is disabled

📡 Detection & Monitoring

Log Indicators:

  • Unusual TLS handshake failures
  • Multiple connection attempts with different cipher suites

Network Indicators:

  • Unusual network traffic patterns targeting TLS ports
  • Attempts to force specific cipher suites

SIEM Query:

tls.cipher_suite:"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256" AND dest_ip:[affected_device_ips]

🔗 References

📤 Share & Export