CVE-2024-39675: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Siemens RUGGEDCOM RMC30
A vulnerability has been identified in RUGGEDCOM RMC30 (All versions < V4.3.10), RUGGEDCOM RMC30NC (All versions < V4.3.10), RUGGEDCOM RP110 (All versions < V4.3.10), RUGGEDCOM RP110NC (All versions < V4.3.10), RUGGEDCOM RS400 (All versions < V4.3.10), RUGGEDCOM RS400NC (All versions < V4.3.10), RUGGEDCOM RS401 (All versions < V4.3.10), RUGGEDCOM RS401NC (All versions < V4.3.10), RUGGEDCOM RS416 (All versions < V4.3.10), RUGGEDCOM RS416NC (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416P (All versions < V4.3.10), RUGGEDCOM RS416PNC (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS910 (All versions < V4.3.10), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910LNC (All versions), RUGGEDCOM RS910NC (All versions < V4.3.10), RUGGEDCOM RS910W (All versions < V4.3.10), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920LNC (All versions), RUGGEDCOM RS920W (All versions). In some configurations the affected products wrongly enable the Modbus service in non-managed VLANS. Only serial devices are affected by this vulnerability.
AI Analysis
Technical Summary
CVE-2024-39675 is a high-severity vulnerability affecting multiple Siemens RUGGEDCOM industrial networking devices, including RMC30, RP110, RS400, RS401, RS416, RS910, RS920 series, and their variants, specifically all versions prior to V4.3.10 or V5.9.0 depending on the model. The root cause is the improper enabling of the Modbus service on non-managed VLANs in certain configurations. Modbus is a widely used industrial communication protocol, often employed in supervisory control and data acquisition (SCADA) and other industrial control system (ICS) environments. The vulnerability is classified under CWE-497, which relates to the exposure of sensitive system information to an unauthorized control sphere. This means that unauthorized actors can gain access to sensitive system information that should otherwise be restricted, potentially allowing them to gather intelligence about the device or network configuration. The vulnerability affects only serial devices, which are commonly used in industrial environments for communication between controllers and field devices. The CVSS v3.1 base score is 8.8, indicating a high severity level. The vector string (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the attack vector is adjacent network (AV:A), requiring low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the device's data and operation. The scope is unchanged (S:U), so the impact is limited to the vulnerable component. Exploit code is not currently known to be in the wild, but the vulnerability is publicly disclosed and documented by Siemens and CISA. The exposure of sensitive system information via Modbus on non-managed VLANs could allow attackers to map network topology, identify device configurations, or launch further attacks such as command injection or denial of service. Given the critical role of RUGGEDCOM devices in industrial networks, this vulnerability poses significant risks to operational technology (OT) environments.
Potential Impact
For European organizations, especially those operating critical infrastructure such as energy utilities, transportation networks, and manufacturing plants, this vulnerability presents a substantial risk. Siemens RUGGEDCOM devices are widely deployed in European industrial and utility sectors due to their ruggedness and reliability in harsh environments. Unauthorized exposure of sensitive system information can facilitate reconnaissance by threat actors, enabling them to plan and execute targeted attacks that could disrupt industrial processes, cause equipment damage, or lead to safety incidents. The high impact on confidentiality, integrity, and availability means that attackers could not only steal sensitive operational data but also manipulate device behavior or cause outages. This is particularly concerning for sectors under strict regulatory oversight such as the European Union’s NIS2 directive, which mandates robust cybersecurity measures for essential services. The vulnerability’s exploitation could lead to operational downtime, financial losses, regulatory penalties, and reputational damage. Additionally, the fact that the Modbus service is enabled on non-managed VLANs suggests potential misconfigurations in network segmentation, increasing the attack surface. Given the interconnected nature of European industrial networks, a successful compromise could propagate risks across supply chains and cross-border operations.
Mitigation Recommendations
1. Immediate patching: Upgrade all affected Siemens RUGGEDCOM devices to the latest firmware versions (at least V4.3.10 or V5.9.0 as applicable) where the vulnerability is addressed. Siemens should be contacted for official patches if not publicly available. 2. Network segmentation review: Conduct a thorough audit of VLAN configurations to ensure that Modbus services are only enabled on managed, secure VLANs with strict access controls. Disable Modbus on any non-managed or unnecessary VLANs. 3. Access control enforcement: Implement strict network access controls using firewalls and intrusion prevention systems to limit Modbus traffic only to authorized devices and users. 4. Monitoring and anomaly detection: Deploy industrial network monitoring tools capable of detecting unusual Modbus traffic patterns or unauthorized access attempts. 5. Incident response readiness: Prepare and test incident response plans specifically for OT environments, including procedures for isolating affected devices and restoring operations. 6. Vendor coordination: Maintain communication with Siemens for updates, advisories, and support. 7. Configuration hardening: Review device configurations to disable unused services and enforce strong authentication where possible. 8. Physical security: Ensure physical access to RUGGEDCOM devices is restricted to prevent local exploitation. 9. Training and awareness: Educate OT personnel on the risks associated with Modbus exposure and best practices for secure industrial network management. These steps go beyond generic advice by focusing on the specific vulnerability vector (Modbus on non-managed VLANs) and the operational context of RUGGEDCOM devices in industrial networks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Norway, Finland
CVE-2024-39675: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in Siemens RUGGEDCOM RMC30
Description
A vulnerability has been identified in RUGGEDCOM RMC30 (All versions < V4.3.10), RUGGEDCOM RMC30NC (All versions < V4.3.10), RUGGEDCOM RP110 (All versions < V4.3.10), RUGGEDCOM RP110NC (All versions < V4.3.10), RUGGEDCOM RS400 (All versions < V4.3.10), RUGGEDCOM RS400NC (All versions < V4.3.10), RUGGEDCOM RS401 (All versions < V4.3.10), RUGGEDCOM RS401NC (All versions < V4.3.10), RUGGEDCOM RS416 (All versions < V4.3.10), RUGGEDCOM RS416NC (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416NCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416P (All versions < V4.3.10), RUGGEDCOM RS416PNC (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416PNCv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416Pv2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.9.0), RUGGEDCOM RS416v2 V4.X (All versions < V4.3.10), RUGGEDCOM RS416v2 V5.X (All versions < V5.9.0), RUGGEDCOM RS910 (All versions < V4.3.10), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910LNC (All versions), RUGGEDCOM RS910NC (All versions < V4.3.10), RUGGEDCOM RS910W (All versions < V4.3.10), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920LNC (All versions), RUGGEDCOM RS920W (All versions). In some configurations the affected products wrongly enable the Modbus service in non-managed VLANS. Only serial devices are affected by this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-39675 is a high-severity vulnerability affecting multiple Siemens RUGGEDCOM industrial networking devices, including RMC30, RP110, RS400, RS401, RS416, RS910, RS920 series, and their variants, specifically all versions prior to V4.3.10 or V5.9.0 depending on the model. The root cause is the improper enabling of the Modbus service on non-managed VLANs in certain configurations. Modbus is a widely used industrial communication protocol, often employed in supervisory control and data acquisition (SCADA) and other industrial control system (ICS) environments. The vulnerability is classified under CWE-497, which relates to the exposure of sensitive system information to an unauthorized control sphere. This means that unauthorized actors can gain access to sensitive system information that should otherwise be restricted, potentially allowing them to gather intelligence about the device or network configuration. The vulnerability affects only serial devices, which are commonly used in industrial environments for communication between controllers and field devices. The CVSS v3.1 base score is 8.8, indicating a high severity level. The vector string (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the attack vector is adjacent network (AV:A), requiring low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker can fully compromise the device's data and operation. The scope is unchanged (S:U), so the impact is limited to the vulnerable component. Exploit code is not currently known to be in the wild, but the vulnerability is publicly disclosed and documented by Siemens and CISA. The exposure of sensitive system information via Modbus on non-managed VLANs could allow attackers to map network topology, identify device configurations, or launch further attacks such as command injection or denial of service. Given the critical role of RUGGEDCOM devices in industrial networks, this vulnerability poses significant risks to operational technology (OT) environments.
Potential Impact
For European organizations, especially those operating critical infrastructure such as energy utilities, transportation networks, and manufacturing plants, this vulnerability presents a substantial risk. Siemens RUGGEDCOM devices are widely deployed in European industrial and utility sectors due to their ruggedness and reliability in harsh environments. Unauthorized exposure of sensitive system information can facilitate reconnaissance by threat actors, enabling them to plan and execute targeted attacks that could disrupt industrial processes, cause equipment damage, or lead to safety incidents. The high impact on confidentiality, integrity, and availability means that attackers could not only steal sensitive operational data but also manipulate device behavior or cause outages. This is particularly concerning for sectors under strict regulatory oversight such as the European Union’s NIS2 directive, which mandates robust cybersecurity measures for essential services. The vulnerability’s exploitation could lead to operational downtime, financial losses, regulatory penalties, and reputational damage. Additionally, the fact that the Modbus service is enabled on non-managed VLANs suggests potential misconfigurations in network segmentation, increasing the attack surface. Given the interconnected nature of European industrial networks, a successful compromise could propagate risks across supply chains and cross-border operations.
Mitigation Recommendations
1. Immediate patching: Upgrade all affected Siemens RUGGEDCOM devices to the latest firmware versions (at least V4.3.10 or V5.9.0 as applicable) where the vulnerability is addressed. Siemens should be contacted for official patches if not publicly available. 2. Network segmentation review: Conduct a thorough audit of VLAN configurations to ensure that Modbus services are only enabled on managed, secure VLANs with strict access controls. Disable Modbus on any non-managed or unnecessary VLANs. 3. Access control enforcement: Implement strict network access controls using firewalls and intrusion prevention systems to limit Modbus traffic only to authorized devices and users. 4. Monitoring and anomaly detection: Deploy industrial network monitoring tools capable of detecting unusual Modbus traffic patterns or unauthorized access attempts. 5. Incident response readiness: Prepare and test incident response plans specifically for OT environments, including procedures for isolating affected devices and restoring operations. 6. Vendor coordination: Maintain communication with Siemens for updates, advisories, and support. 7. Configuration hardening: Review device configurations to disable unused services and enforce strong authentication where possible. 8. Physical security: Ensure physical access to RUGGEDCOM devices is restricted to prevent local exploitation. 9. Training and awareness: Educate OT personnel on the risks associated with Modbus exposure and best practices for secure industrial network management. These steps go beyond generic advice by focusing on the specific vulnerability vector (Modbus on non-managed VLANs) and the operational context of RUGGEDCOM devices in industrial networks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2024-06-27T11:41:41.875Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbed200
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 6/25/2025, 3:48:51 PM
Last updated: 8/13/2025, 11:58:01 AM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.