CVE-2025-40802
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-09

Last updated on: 2025-10-03

Assigner: Siemens AG

Description
A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions). The affected device may be susceptible to resource exhaustion when subjected to high volumes of query requests. This could allow an attacker to cause a temporary denial of service, with the system recovering once the activity stops.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-09
Last Modified
2025-10-03
Generated
2026-05-06
AI Q&A
2025-09-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
siemens ruggedcom_rst2428p_firmware *
siemens ruggedcom_rst2428p *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the RUGGEDCOM RST2428P device and occurs when the device is subjected to a high volume of query requests. This can lead to resource exhaustion, causing the device to temporarily become unavailable or experience a denial of service. The system recovers once the high activity stops.


How can this vulnerability impact me? :

An attacker could exploit this vulnerability by sending a large number of query requests to the affected device, causing it to exhaust its resources and temporarily deny service. This could disrupt normal operations until the attack stops and the system recovers.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for high volumes of query requests targeting the RUGGEDCOM RST2428P device, which may lead to resource exhaustion. While no specific detection commands are provided, network administrators can use tools like packet analyzers or network monitoring software to identify unusual spikes in query traffic to the device. Additionally, checking for traffic on UDP ports 34964 and in the range 49152-65535, which are used by related discovery protocols, may help identify suspicious activity. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include creating firewall rules to block UDP ports 34964 and the port range 49152-65535 if these are not required for normal operation. Additionally, it is recommended to protect network access with appropriate security mechanisms and configure the environment according to Siemens' operational guidelines for Industrial Security. Since no fix is currently available, these measures help reduce the risk of exploitation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart