Brief

Summary:

A vulnerability has been identified in Siemens RUGGEDCOM APE1808, an application hosting platform, affecting four different versions. The vulnerabilities include:

1. Cross-Site Scripting (XSS): Allows a malicious authenticated administrator to store a JavaScript payload using the web interface.
2. Improper Privilege Management: Enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage.
3. Truncation of Security-Related Information: Allows remote attackers to bypass integrity checks, omitting security features.
4. Insufficient Session Expiration: Web sessions in the management interface do not expire, allowing unauthorized access.

The affected versions are all versions of Siemens RUGGEDCOM APE1808 with Palo Alto Networks Virtual NGFW configured. The vulnerabilities have a CVSS score ranging from 4.8 to 8.2, indicating a high severity. Siemens has released patch and update information, and users are advised to apply the recommended mitigations to reduce risk. Additionally, users are encouraged to implement defensive measures, perform proper impact analysis, and assess risk before deploying defensive measures.

1. EXECUTIVE SUMMARY CVSS v4 8.2 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: RUGGEDCOM APE1808 Vulnerabilities: Cross-site Scripting, Improper Privilege Management, Improper Check for Unusual or Exceptional Conditions, Truncation of Security-relevant Information, Insufficient Session Expiration 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a malicious administrator to store a JavaScript payload using

This content is restricted.

Highlights content goes here...

1. EXECUTIVE SUMMARY CVSS v4 8.2 ATTENTION: Exploitable remotely/low attack complexity Vendor: Siemens Equipment: RUGGEDCOM APE1808 Vulnerabilities: Cross-site Scripting, Improper Privilege Management, Improper Check for Unusual or Exceptional Conditions, Truncation of Security-relevant Information, Insufficient Session Expiration 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a malicious administrator to store a JavaScript payload using

This content is restricted.

Cybersecurity and Infrastructure Security Agency

Quick Insight
RADA.AI
RADA.AI
Hello! I'm RADA.AI - Regulatory Analysis and Decision Assistance. Your Intelligent guide for compliance and decision-making. How can i assist you today?
Suggested

Form successfully submitted. One of our GRI rep will contact you shortly

Thanking You!

Enter your Email

Enter your registered username/email id.

Enter your Email

Enter your email id below to signup.
Individual Plan
$125 / month OR $1250 / year
Features
Best for: Researchers, Legal professionals, Academics
Enterprise Plan
Contact for Pricing
Features
Best for: Law Firms, Corporations, Government Bodies