CVE-2025-41224

8.8 HIGH

📋 TL;DR

This vulnerability in Siemens RUGGEDCOM industrial networking devices allows authenticated attackers to bypass interface access restrictions when switching from management to non-management configurations. Attackers can maintain SSH access through non-management interfaces until device reboot, affecting numerous RUGGEDCOM product lines running firmware versions below V5.10.0.

💻 Affected Systems

Products:
  • RUGGEDCOM RMC8388
  • RUGGEDCOM RMC8388NC
  • RUGGEDCOM RS416NCv2
  • RUGGEDCOM RS416PNCv2
  • RUGGEDCOM RS416Pv2
  • RUGGEDCOM RS416v2
  • RUGGEDCOM RS900 (32M)
  • RUGGEDCOM RS900G (32M)
  • RUGGEDCOM RS900GNC(32M)
  • RUGGEDCOM RS900NC(32M)
  • RUGGEDCOM RSG2100 (32M)
  • RUGGEDCOM RSG2100NC(32M)
  • RUGGEDCOM RSG2100P (32M)
  • RUGGEDCOM RSG2100PNC (32M)
  • RUGGEDCOM RSG2288
  • RUGGEDCOM RSG2288NC
  • RUGGEDCOM RSG2300
  • RUGGEDCOM RSG2300NC
  • RUGGEDCOM RSG2300P
  • RUGGEDCOM RSG2300PNC
  • RUGGEDCOM RSG2488
  • RUGGEDCOM RSG2488NC
  • RUGGEDCOM RSG907R
  • RUGGEDCOM RSG908C
  • RUGGEDCOM RSG909R
  • RUGGEDCOM RSG910C
  • RUGGEDCOM RSG920P
  • RUGGEDCOM RSG920PNC
  • RUGGEDCOM RSL910
  • RUGGEDCOM RSL910NC
  • RUGGEDCOM RST2228
  • RUGGEDCOM RST2228P
  • RUGGEDCOM RST916C
  • RUGGEDCOM RST916P
Versions: All versions < V5.10.0
Operating Systems: Siemens RUGGEDCOM firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices when switching from management to non-management interface configurations. Vulnerability persists until system reboot even after configuration is saved.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with valid credentials could establish persistent backdoor access through non-management interfaces, potentially gaining full device control and using it as a pivot point into industrial control networks.

🟠

Likely Case

Authenticated attackers maintaining SSH access through unintended interfaces, allowing them to bypass network segmentation and access control policies.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the specific device, though persistent access could still be established.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires valid credentials and network access to the device. Exploitation involves changing interface configurations and maintaining SSH sessions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V5.10.0

Vendor Advisory: https://cert-portal.siemens.com/productcert/html/ssa-083019.html

Restart Required: Yes

Instructions:

1. Download firmware V5.10.0 or later from Siemens support portal. 2. Backup current configuration. 3. Upload and install new firmware via web interface or CLI. 4. Reboot device to apply changes. 5. Verify firmware version is V5.10.0 or higher.

🔧 Temporary Workarounds

Regular Device Reboots

all

Schedule regular reboots to clear any persistent SSH sessions established through non-management interfaces

reboot

Restrict Interface Configuration Changes

all

Limit user permissions to prevent unauthorized interface configuration changes

configure user permissions to restrict interface configuration access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from critical networks
  • Monitor for SSH connections from non-management interfaces and alert on suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or CLI. If version is below V5.10.0, device is vulnerable.

Check Version:

show version

Verify Fix Applied:

Verify firmware version is V5.10.0 or higher and test that interface access restrictions are properly enforced immediately after configuration changes.

📡 Detection & Monitoring

Log Indicators:

  • SSH connection attempts from non-management interfaces
  • Interface configuration changes without subsequent reboots
  • Persistent SSH sessions across interface changes

Network Indicators:

  • SSH traffic originating from non-management IP addresses
  • Unexpected SSH connections after interface reconfiguration

SIEM Query:

source_ip IN (non_management_subnets) AND protocol=ssh AND device_type="RUGGEDCOM"

🔗 References

📤 Share & Export