CVE-2025-41224
BaseFortify
Publication date: 2025-07-08
Last updated on: 2025-07-08
Assigner: Siemens AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| siemens | ruggedcom_rsg907r | v5.0 |
| siemens | ruggedcom_rsl910 | v5.0 |
| siemens | ruggedcom_rsg909r | v5.0 |
| siemens | ruggedcom_rst2228 | v5.0 |
| siemens | ruggedcom_rst916c | v5.0 |
| siemens | ruggedcom_rs416pncv2 | v5.0 |
| siemens | ruggedcom_rsg2300pnc | v5.0 |
| siemens | ruggedcom_rsg2300p | v5.0 |
| siemens | ruggedcom_rsg2288 | v5.0 |
| siemens | ruggedcom_rsg2488 | v5.0 |
| siemens | ruggedcom_rs900 | v5.0 |
| siemens | ruggedcom_rst2228p | v5.0 |
| siemens | ruggedcom_rsg2288nc | v5.0 |
| siemens | ruggedcom_rs900g | v5.0 |
| siemens | ruggedcom_rsg2488nc | v5.0 |
| siemens | ruggedcom_rmc8388nc | v5.0 |
| siemens | ruggedcom_rsg2100 | v5.0 |
| siemens | ruggedcom_rs416pv2 | v5.0 |
| siemens | ruggedcom_rsg2300nc | v5.0 |
| siemens | ruggedcom_rsg2100p | v5.0 |
| siemens | ruggedcom_rsl910nc | v5.0 |
| siemens | ruggedcom_rsg920p | v5.0 |
| siemens | ruggedcom_rs416nc | v5.0 |
| siemens | ruggedcom_rs900nc | v5.0 |
| siemens | ruggedcom_rsg2100pnc | v5.0 |
| siemens | ruggedcom_rsg2300 | v5.0 |
| siemens | ruggedcom_rsg920pnc | v5.0 |
| siemens | ruggedcom_rsg908c | v5.0 |
| siemens | ruggedcom_rs416v2 | v5.0 |
| siemens | ruggedcom_rmc8388 | v5.0 |
| siemens | ruggedcom_rst916p | v5.0 |
| siemens | ruggedcom_rs900gnc | v5.0 |
| siemens | ruggedcom_rsg2100nc | v5.0 |
| siemens | ruggedcom_rsg910c | v5.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-693 | The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed attacks against the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects multiple versions of RUGGEDCOM devices before version 5.10.0. The issue is that these devices do not properly enforce interface access restrictions when switching from management to non-management interface configurations until the device is rebooted, even if the configuration is saved. This flaw allows an attacker who has network access and valid credentials to gain access to the device through a non-management interface and maintain SSH access until the device is rebooted.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker with network access and credentials to access the device through non-management interfaces and maintain unauthorized SSH access until the device is rebooted. This could lead to unauthorized control or manipulation of the device, potentially disrupting operations or compromising network security.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately upgrade the affected RUGGEDCOM devices to version 5.10.0 or later. Until the upgrade is applied, a temporary mitigation is to reboot the device after changing interface configurations to ensure access restrictions are properly enforced.