CVE-2025-40802
BaseFortify
Publication date: 2025-09-09
Last updated on: 2025-10-03
Assigner: Siemens AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| siemens | ruggedcom_rst2428p_firmware | * |
| siemens | ruggedcom_rst2428p | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the RUGGEDCOM RST2428P device and occurs when the device is subjected to a high volume of query requests. This can lead to resource exhaustion, causing the device to temporarily become unavailable or experience a denial of service. The system recovers once the high activity stops.
How can this vulnerability impact me? :
An attacker could exploit this vulnerability by sending a large number of query requests to the affected device, causing it to exhaust its resources and temporarily deny service. This could disrupt normal operations until the attack stops and the system recovers.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for high volumes of query requests targeting the RUGGEDCOM RST2428P device, which may lead to resource exhaustion. While no specific detection commands are provided, network administrators can use tools like packet analyzers or network monitoring software to identify unusual spikes in query traffic to the device. Additionally, checking for traffic on UDP ports 34964 and in the range 49152-65535, which are used by related discovery protocols, may help identify suspicious activity. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include creating firewall rules to block UDP ports 34964 and the port range 49152-65535 if these are not required for normal operation. Additionally, it is recommended to protect network access with appropriate security mechanisms and configure the environment according to Siemens' operational guidelines for Industrial Security. Since no fix is currently available, these measures help reduce the risk of exploitation. [1]