Skip to main content

CVE-2023-52238: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens RUGGEDCOM RST2228

Medium
VulnerabilityCVE-2023-52238cvecve-2023-52238cwe-200
Published: Tue Jul 09 2024 (07/09/2024, 12:04:40 UTC)
Source: CVE
Vendor/Project: Siemens
Product: RUGGEDCOM RST2228

Description

A vulnerability has been identified in RUGGEDCOM RST2228 (All versions < V5.9.0), RUGGEDCOM RST2228P (All versions < V5.9.0). The web server of the affected systems leaks the MACSEC key in clear text to a logged in user. An attacker with the credentials of a low privileged user could retrieve the MACSEC key and access (decrypt) the ethernet frames sent by authorized recipients.

AI-Powered Analysis

AILast updated: 06/25/2025, 16:25:02 UTC

Technical Analysis

CVE-2023-52238 is a medium-severity vulnerability affecting Siemens RUGGEDCOM RST2228 and RST2228P devices running firmware versions prior to 5.9.0. These devices are ruggedized industrial network switches commonly deployed in critical infrastructure environments such as utilities, transportation, and industrial automation across Europe. The vulnerability arises from the web server interface of the affected devices leaking the MAC Security (MACsec) key in clear text to any authenticated user, including those with low-privileged credentials. MACsec is a Layer 2 encryption protocol designed to secure Ethernet frames between network devices, ensuring confidentiality and integrity of data in transit. By exposing the MACsec key, an attacker with low-level access can decrypt Ethernet frames sent by authorized devices, potentially intercepting sensitive operational data or gaining insight into network communications. The vulnerability requires the attacker to have valid login credentials but does not require user interaction beyond authentication. Exploitation is network-based (AV:N), with low attack complexity (AC:L), and no user interaction (UI:N) is needed. The vulnerability does not impact integrity or availability directly but compromises confidentiality of network traffic. No known exploits are currently reported in the wild, and Siemens has not yet published a patch or mitigation guidance as of the publication date. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the confidentiality impact and the requirement for low-privileged credentials. This vulnerability falls under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).

Potential Impact

For European organizations, particularly those operating critical infrastructure sectors such as energy, transportation, and industrial manufacturing, this vulnerability poses a significant risk to the confidentiality of network communications. The ability to decrypt MACsec-protected Ethernet frames could allow attackers to eavesdrop on sensitive operational data, including control commands, monitoring information, or proprietary communications. This exposure could facilitate further targeted attacks, industrial espionage, or disruption planning. Given the widespread use of Siemens RUGGEDCOM devices in European critical infrastructure, exploitation could undermine trust in network security and potentially lead to regulatory compliance issues under frameworks such as NIS2 and GDPR if sensitive data is exposed. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach could have cascading effects on operational security and incident response. The requirement for valid credentials limits the attack surface to insiders or attackers who have compromised low-privilege accounts, but this is a realistic scenario in many environments. The lack of user interaction and low complexity of exploitation increase the risk that attackers could leverage this vulnerability once credentials are obtained.

Mitigation Recommendations

Immediately upgrade Siemens RUGGEDCOM RST2228 and RST2228P devices to firmware version 5.9.0 or later once available, as this version addresses the vulnerability. Implement strict access controls and multi-factor authentication (MFA) on device management interfaces to reduce the risk of credential compromise, especially for low-privileged accounts. Conduct regular audits of user accounts and permissions on RUGGEDCOM devices to ensure that only necessary personnel have access, and remove or disable unused accounts. Monitor network traffic for unusual patterns that may indicate attempts to access or extract MACsec keys or decrypt Ethernet frames. Segment critical network infrastructure to limit lateral movement opportunities for attackers who gain low-level access. If immediate patching is not possible, consider disabling web server access or restricting it to trusted management networks only, reducing exposure of the vulnerable interface. Establish incident response procedures specifically for industrial control system (ICS) environments to quickly detect and respond to potential exploitation attempts. Engage with Siemens support and subscribe to their security advisories to receive timely updates and patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2023-12-29T16:54:27.071Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbed156

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 4:25:02 PM

Last updated: 8/10/2025, 4:55:36 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats