CVE-2025-40567: CWE-863: Incorrect Authorization in Siemens RUGGEDCOM RST2428P
A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.2). The "Load Rollback" functionality in the web interface of affected products contains an incorrect authorization check vulnerability. This could allow an authenticated remote attacker with "guest" role to make the affected product roll back configuration changes made by privileged users.
AI Analysis
Technical Summary
CVE-2025-40567 is an authorization bypass vulnerability classified under CWE-863, discovered in Siemens RUGGEDCOM RST2428P and multiple SCALANCE series devices (including XCH328, XCM324, XCM328, XCM332, XRH334, and various XRM334 models) with firmware versions earlier than 3.2. The vulnerability specifically affects the "Load Rollback" functionality accessible via the device's web interface. Normally, only privileged users should be able to perform configuration rollbacks to restore previous device settings. However, due to an incorrect authorization check, an authenticated user assigned the "guest" role can invoke this rollback feature. This unauthorized rollback can negate configuration changes made by administrators or other privileged users, potentially reverting security settings or operational parameters to less secure or outdated states. The attack vector requires network access and valid guest credentials but does not require user interaction beyond authentication. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the vulnerability's impact on integrity without affecting confidentiality or availability. No public exploits have been reported yet, but the vulnerability could be leveraged in targeted attacks against industrial control systems (ICS) or critical infrastructure networks that utilize these Siemens devices. The affected devices are commonly deployed in industrial environments such as energy, manufacturing, transportation, and utilities, making this vulnerability relevant to operational technology (OT) security.
Potential Impact
For European organizations, especially those operating critical infrastructure and industrial control systems, this vulnerability poses a significant risk to operational integrity. Unauthorized rollback of device configurations can lead to the reintroduction of insecure settings, disablement of security controls, or disruption of network segmentation policies. This undermines trust in device configurations and may facilitate further attacks by adversaries exploiting weakened defenses. Given Siemens' strong market presence in Europe’s industrial sectors—including Germany, France, Italy, Spain, and the UK—many organizations could be affected. The vulnerability could impact sectors such as energy production and distribution, manufacturing plants, transportation networks, and utilities, where these devices are integral to network reliability and security. The potential for an attacker with minimal privileges to alter device configurations without detection increases the risk of prolonged undetected compromise and operational disruptions. Although availability is not directly impacted, the integrity breach could cascade into broader operational issues or safety hazards in industrial environments.
Mitigation Recommendations
1. Upgrade affected Siemens RUGGEDCOM and SCALANCE devices to firmware version 3.2 or later, where the authorization flaw is corrected. 2. Restrict network access to device management interfaces, ensuring only trusted administrators can reach the web interface, ideally via VPN or secure management networks. 3. Enforce strong authentication mechanisms and consider disabling or limiting guest accounts to prevent unauthorized access. 4. Implement network segmentation to isolate industrial control devices from general IT networks and internet exposure. 5. Monitor device configuration changes and rollback events through centralized logging and alerting systems to detect unauthorized activities promptly. 6. Conduct regular audits of user roles and permissions on these devices to ensure least privilege principles are maintained. 7. Employ intrusion detection systems tailored for OT environments to identify anomalous behavior related to configuration management. 8. Develop and test incident response plans specific to configuration integrity breaches in industrial devices.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-40567: CWE-863: Incorrect Authorization in Siemens RUGGEDCOM RST2428P
Description
A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.2). The "Load Rollback" functionality in the web interface of affected products contains an incorrect authorization check vulnerability. This could allow an authenticated remote attacker with "guest" role to make the affected product roll back configuration changes made by privileged users.
AI-Powered Analysis
Technical Analysis
CVE-2025-40567 is an authorization bypass vulnerability classified under CWE-863, discovered in Siemens RUGGEDCOM RST2428P and multiple SCALANCE series devices (including XCH328, XCM324, XCM328, XCM332, XRH334, and various XRM334 models) with firmware versions earlier than 3.2. The vulnerability specifically affects the "Load Rollback" functionality accessible via the device's web interface. Normally, only privileged users should be able to perform configuration rollbacks to restore previous device settings. However, due to an incorrect authorization check, an authenticated user assigned the "guest" role can invoke this rollback feature. This unauthorized rollback can negate configuration changes made by administrators or other privileged users, potentially reverting security settings or operational parameters to less secure or outdated states. The attack vector requires network access and valid guest credentials but does not require user interaction beyond authentication. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the vulnerability's impact on integrity without affecting confidentiality or availability. No public exploits have been reported yet, but the vulnerability could be leveraged in targeted attacks against industrial control systems (ICS) or critical infrastructure networks that utilize these Siemens devices. The affected devices are commonly deployed in industrial environments such as energy, manufacturing, transportation, and utilities, making this vulnerability relevant to operational technology (OT) security.
Potential Impact
For European organizations, especially those operating critical infrastructure and industrial control systems, this vulnerability poses a significant risk to operational integrity. Unauthorized rollback of device configurations can lead to the reintroduction of insecure settings, disablement of security controls, or disruption of network segmentation policies. This undermines trust in device configurations and may facilitate further attacks by adversaries exploiting weakened defenses. Given Siemens' strong market presence in Europe’s industrial sectors—including Germany, France, Italy, Spain, and the UK—many organizations could be affected. The vulnerability could impact sectors such as energy production and distribution, manufacturing plants, transportation networks, and utilities, where these devices are integral to network reliability and security. The potential for an attacker with minimal privileges to alter device configurations without detection increases the risk of prolonged undetected compromise and operational disruptions. Although availability is not directly impacted, the integrity breach could cascade into broader operational issues or safety hazards in industrial environments.
Mitigation Recommendations
1. Upgrade affected Siemens RUGGEDCOM and SCALANCE devices to firmware version 3.2 or later, where the authorization flaw is corrected. 2. Restrict network access to device management interfaces, ensuring only trusted administrators can reach the web interface, ideally via VPN or secure management networks. 3. Enforce strong authentication mechanisms and consider disabling or limiting guest accounts to prevent unauthorized access. 4. Implement network segmentation to isolate industrial control devices from general IT networks and internet exposure. 5. Monitor device configuration changes and rollback events through centralized logging and alerting systems to detect unauthorized activities promptly. 6. Conduct regular audits of user roles and permissions on these devices to ensure least privilege principles are maintained. 7. Employ intrusion detection systems tailored for OT environments to identify anomalous behavior related to configuration management. 8. Develop and test incident response plans specific to configuration integrity breaches in industrial devices.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2025-04-16T08:20:17.031Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f501b0bd07c39389a67
Added to database: 6/10/2025, 6:54:08 PM
Last enriched: 1/14/2026, 12:44:32 AM
Last updated: 1/19/2026, 11:55:46 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1152: Unrestricted Upload in technical-laohu mpay
MediumCVE-2026-1151: Cross Site Scripting in technical-laohu mpay
MediumCVE-2026-1150: Command Injection in Totolink LR350
Medium42,000 Impacted by Ingram Micro Ransomware Attack
MediumCVE-2026-1149: Command Injection in Totolink LR350
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.