Skip to main content

CVE-2025-40567: CWE-863: Incorrect Authorization in Siemens RUGGEDCOM RST2428P

Medium
VulnerabilityCVE-2025-40567cvecve-2025-40567cwe-863
Published: Tue Jun 10 2025 (06/10/2025, 15:17:28 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: RUGGEDCOM RST2428P

Description

A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.2), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (All versions < V3.2), SCALANCE XC332 (6GK5332-0GA00-2AC2) (All versions < V3.2), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (All versions < V3.2), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (All versions < V3.2), SCALANCE XC432 (6GK5432-0GR00-2AC2) (All versions < V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (All versions < V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.2). The "Load Rollback" functionality in the web interface of affected products contains an incorrect authorization check vulnerability. This could allow an authenticated remote attacker with "guest" role to make the affected product roll back configuration changes made by privileged users.

AI-Powered Analysis

AILast updated: 07/10/2025, 20:03:36 UTC

Technical Analysis

CVE-2025-40567 is a medium-severity vulnerability affecting multiple Siemens industrial networking devices, specifically the RUGGEDCOM RST2428P and a broad range of SCALANCE XC, XR, XCH, XCM, XRM, and XRH series switches and routers, all with firmware versions prior to V3.2. The vulnerability is classified under CWE-863, which pertains to incorrect authorization. The issue resides in the "Load Rollback" functionality accessible via the web interface of these devices. This functionality is intended to allow privileged users to revert configuration changes to a previous state. However, due to improper authorization checks, an authenticated attacker with only "guest" level privileges can exploit this flaw to trigger a rollback of configuration changes made by higher-privileged users. This means that an attacker who has minimal access rights can undo configuration updates, potentially disrupting network operations or security postures established by administrators. The vulnerability requires authentication but no user interaction beyond that. The CVSS v3.1 base score is 6.5 (medium), reflecting the network attack vector, low attack complexity, and the requirement for privileges but no user interaction. The impact is primarily on integrity, as the attacker can alter device configuration states without proper authorization, but confidentiality and availability are not directly affected. No known exploits are reported in the wild yet, and no patches are listed at the time of publication. Siemens devices affected are widely used in industrial control systems (ICS) and critical infrastructure environments, where network reliability and configuration integrity are paramount. The vulnerability could be leveraged to cause operational disruptions or facilitate further attacks by reverting security configurations or network segmentation settings.

Potential Impact

For European organizations, especially those operating critical infrastructure such as energy grids, transportation networks, manufacturing plants, and utilities, this vulnerability poses a significant risk. Siemens SCALANCE and RUGGEDCOM devices are commonly deployed in these sectors across Europe due to their rugged design and industrial-grade features. An attacker exploiting this flaw could undermine network security by rolling back security policies, firewall rules, or segmentation configurations, potentially enabling lateral movement or exposure to other threats. This could lead to operational disruptions, compliance violations (e.g., NIS Directive requirements), and increased risk of sabotage or espionage. Since the vulnerability requires only guest-level authentication, it lowers the barrier for insider threats or attackers who have gained minimal access through phishing or other means. The integrity compromise could also delay incident response or recovery efforts if configuration rollbacks undo remediation actions. Although availability is not directly impacted, the indirect effects on operational continuity could be severe in critical environments.

Mitigation Recommendations

1. Immediate upgrade to Siemens firmware version 3.2 or later on all affected devices to ensure the authorization flaw is patched. 2. Restrict and monitor access to the web interface, especially limiting guest role accounts or disabling guest access if not necessary. 3. Implement network segmentation and access control lists (ACLs) to limit which hosts can reach the management interfaces of these devices. 4. Employ strong authentication mechanisms, such as multifactor authentication (MFA), for all user roles with access to device management interfaces. 5. Regularly audit device configurations and change logs to detect unauthorized rollbacks or configuration changes. 6. Use network intrusion detection systems (NIDS) to monitor for unusual configuration rollback commands or web interface access patterns. 7. Establish strict operational procedures for configuration changes and rollbacks, including out-of-band verification and approval workflows. 8. If immediate patching is not feasible, consider disabling the "Load Rollback" functionality if possible or restricting it to trusted administrators only. 9. Coordinate with Siemens support for any interim mitigation advice and monitor for official patches or advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-04-16T08:20:17.031Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f501b0bd07c39389a67

Added to database: 6/10/2025, 6:54:08 PM

Last enriched: 7/10/2025, 8:03:36 PM

Last updated: 7/10/2025, 8:03:36 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats