Skip to main content

CVE-2023-52237: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens RUGGEDCOM i800

High
VulnerabilityCVE-2023-52237cvecve-2023-52237cwe-200
Published: Tue Jul 09 2024 (07/09/2024, 12:04:39 UTC)
Source: CVE
Vendor/Project: Siemens
Product: RUGGEDCOM i800

Description

A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416NC, RUGGEDCOM RS416NCv2 V4.X, RUGGEDCOM RS416NCv2 V5.X, RUGGEDCOM RS416P, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNCv2 V4.X, RUGGEDCOM RS416PNCv2 V5.X, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The web server of the affected devices allow a low privileged user to access hashes and password salts of all system's users, including admin users. An attacker could use the obtained information to brute force the passwords offline.

AI-Powered Analysis

AILast updated: 06/25/2025, 16:39:02 UTC

Technical Analysis

CVE-2023-52237 is a high-severity vulnerability affecting a broad range of Siemens RUGGEDCOM devices, including models i800, i801, i802, i803, M2100, M2200, M969, RMC30, RMC8388, RP110, RS1600 series, RS400 series, RS416 series, RS8000 series, RS900 series, RS910 series, RS920 series, RS930 series, RS940G, RS969, RSG2100 series, RSG2200 series, RSG2288 series, RSG2300 series, RSG2488 series, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P series, RSL910, RST2228 series, and RST916 series. These devices are industrial-grade ruggedized network components commonly deployed in critical infrastructure sectors such as energy, transportation, and industrial automation. The vulnerability arises from the embedded web server on these devices allowing a low-privileged user to access sensitive authentication data, specifically password hashes and salts for all system users, including administrative accounts. This exposure constitutes a CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) weakness. An attacker with network access to the device’s web interface can retrieve these hashes and salts without requiring elevated privileges or user interaction. With this data, an attacker can perform offline brute-force or dictionary attacks to recover plaintext passwords, potentially escalating privileges or gaining persistent unauthorized access. The CVSS v3.1 base score is 7.5 (High), reflecting network attack vector, high impact on confidentiality, integrity, and availability, low privileges required, and no user interaction needed. The attack complexity is high due to the need for offline cracking, but the scope remains unchanged as the vulnerability affects only the vulnerable device. No known exploits are currently reported in the wild, but the potential for impactful attacks on critical infrastructure is significant given the nature of the devices affected.

Potential Impact

For European organizations, especially those operating critical infrastructure such as power grids, transportation networks, and industrial control systems, this vulnerability poses a substantial risk. Siemens RUGGEDCOM devices are widely used in Europe for their robustness in harsh environments and are integral to operational technology (OT) networks. Unauthorized access to password hashes can lead to credential compromise, enabling attackers to gain administrative control over network devices. This can result in disruption of services, manipulation of control commands, data exfiltration, or persistent backdoors within critical systems. The exposure threatens confidentiality by revealing sensitive credentials, integrity by allowing unauthorized configuration changes, and availability by potentially enabling denial-of-service attacks. Given the interconnected nature of OT and IT networks in European industries, exploitation could cascade, impacting broader organizational operations and national infrastructure resilience. The high CVSS score underscores the urgency of addressing this vulnerability to prevent potential sabotage, espionage, or cyber-physical attacks.

Mitigation Recommendations

1. Immediate network segmentation: Isolate RUGGEDCOM devices from general IT networks and restrict access to the web management interface to trusted administrative hosts only, using firewall rules and VLAN segmentation. 2. Implement strong access controls: Enforce multi-factor authentication (MFA) where possible on management interfaces and limit user accounts to the minimum necessary privileges. 3. Monitor and log access: Enable detailed logging of web server access on RUGGEDCOM devices and implement real-time monitoring and alerting for suspicious activities, such as repeated access attempts to credential-related endpoints. 4. Password policy enforcement: Ensure all user passwords on affected devices are complex and changed regularly to reduce the risk of successful brute-force attacks on exposed hashes. 5. Offline password hash protection: If possible, apply additional encryption or obfuscation layers on stored password hashes on the device firmware or configuration. 6. Firmware updates: Although no patch links are currently provided, maintain close communication with Siemens for firmware updates or security advisories addressing this vulnerability and apply patches promptly once available. 7. Incident response readiness: Prepare for potential compromise scenarios by developing and testing incident response plans specific to OT environments, including device isolation and credential revocation procedures. 8. Vendor consultation: Engage Siemens support to assess device configurations and explore interim mitigation options or firmware workarounds to disable or restrict web server access to sensitive data.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2023-12-29T16:54:27.071Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed152

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 4:39:02 PM

Last updated: 8/9/2025, 8:38:01 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats