CVE-2023-52236
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-07-08
Assigner: Siemens AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| siemens | ruggedcom_rs416ncv2 | * |
| siemens | ruggedcom_rsg2488nc | * |
| siemens | ruggedcom_rs900 | 32m |
| siemens | ruggedcom_operating_system | 5.10.0 |
| siemens | ruggedcom_rs900nc | 32m |
| siemens | ruggedcom_rmc8388 | * |
| siemens | ruggedcom_rs416pncv2 | * |
| siemens | ruggedcom_rsg2288nc | * |
| siemens | ruggedcom_rs900g | 32m |
| siemens | ruggedcom_rs416pv2 | * |
| siemens | ruggedcom_rmc8388nc | * |
| siemens | ruggedcom_rsg920pnc | * |
| siemens | ruggedcom_rsg2100pnc | * |
| siemens | ruggedcom_rs900gnc | 32m |
| siemens | ruggedcom_rsg2300nc | * |
| siemens | ruggedcom_rs416v2 | * |
| siemens | ruggedcom_rsl910nc | * |
| siemens | ruggedcom_rsg2300pnc | * |
| siemens | ruggedcom_rsg2100nc | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Users should immediately update affected RUGGEDCOM devices to version V5.10.0 or later, as Siemens has released this version to address CVE-2023-52236 and related vulnerabilities. For devices running ROS V4.X and other older versions where no fixes are available, users should apply the workarounds and mitigations detailed in the Siemens advisory. Detailed update instructions and further recommendations are available via Siemens support portal. [1]
Can you explain this vulnerability to me?
This vulnerability affects multiple Siemens RUGGEDCOM devices that use insecure cryptographic algorithms. An attacker could exploit these legacy algorithms to perform man-in-the-middle attacks or impersonate communicating parties, compromising the security of communications.
How can this vulnerability impact me? :
The vulnerability could allow an attacker to intercept or impersonate communications with affected RUGGEDCOM devices, potentially leading to unauthorized access, data manipulation, or disruption of device operations.