Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40567: CWE-863: Incorrect Authorization in Siemens RUGGEDCOM RST2428P

0
Medium
VulnerabilityCVE-2025-40567cvecve-2025-40567cwe-863
Published: Tue Jun 10 2025 (06/10/2025, 15:17:28 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: RUGGEDCOM RST2428P

Description

A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.2). The "Load Rollback" functionality in the web interface of affected products contains an incorrect authorization check vulnerability. This could allow an authenticated remote attacker with "guest" role to make the affected product roll back configuration changes made by privileged users.

AI-Powered Analysis

AILast updated: 01/14/2026, 00:44:32 UTC

Technical Analysis

CVE-2025-40567 is an authorization bypass vulnerability classified under CWE-863, discovered in Siemens RUGGEDCOM RST2428P and multiple SCALANCE series devices (including XCH328, XCM324, XCM328, XCM332, XRH334, and various XRM334 models) with firmware versions earlier than 3.2. The vulnerability specifically affects the "Load Rollback" functionality accessible via the device's web interface. Normally, only privileged users should be able to perform configuration rollbacks to restore previous device settings. However, due to an incorrect authorization check, an authenticated user assigned the "guest" role can invoke this rollback feature. This unauthorized rollback can negate configuration changes made by administrators or other privileged users, potentially reverting security settings or operational parameters to less secure or outdated states. The attack vector requires network access and valid guest credentials but does not require user interaction beyond authentication. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the vulnerability's impact on integrity without affecting confidentiality or availability. No public exploits have been reported yet, but the vulnerability could be leveraged in targeted attacks against industrial control systems (ICS) or critical infrastructure networks that utilize these Siemens devices. The affected devices are commonly deployed in industrial environments such as energy, manufacturing, transportation, and utilities, making this vulnerability relevant to operational technology (OT) security.

Potential Impact

For European organizations, especially those operating critical infrastructure and industrial control systems, this vulnerability poses a significant risk to operational integrity. Unauthorized rollback of device configurations can lead to the reintroduction of insecure settings, disablement of security controls, or disruption of network segmentation policies. This undermines trust in device configurations and may facilitate further attacks by adversaries exploiting weakened defenses. Given Siemens' strong market presence in Europe’s industrial sectors—including Germany, France, Italy, Spain, and the UK—many organizations could be affected. The vulnerability could impact sectors such as energy production and distribution, manufacturing plants, transportation networks, and utilities, where these devices are integral to network reliability and security. The potential for an attacker with minimal privileges to alter device configurations without detection increases the risk of prolonged undetected compromise and operational disruptions. Although availability is not directly impacted, the integrity breach could cascade into broader operational issues or safety hazards in industrial environments.

Mitigation Recommendations

1. Upgrade affected Siemens RUGGEDCOM and SCALANCE devices to firmware version 3.2 or later, where the authorization flaw is corrected. 2. Restrict network access to device management interfaces, ensuring only trusted administrators can reach the web interface, ideally via VPN or secure management networks. 3. Enforce strong authentication mechanisms and consider disabling or limiting guest accounts to prevent unauthorized access. 4. Implement network segmentation to isolate industrial control devices from general IT networks and internet exposure. 5. Monitor device configuration changes and rollback events through centralized logging and alerting systems to detect unauthorized activities promptly. 6. Conduct regular audits of user roles and permissions on these devices to ensure least privilege principles are maintained. 7. Employ intrusion detection systems tailored for OT environments to identify anomalous behavior related to configuration management. 8. Develop and test incident response plans specific to configuration integrity breaches in industrial devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-04-16T08:20:17.031Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f501b0bd07c39389a67

Added to database: 6/10/2025, 6:54:08 PM

Last enriched: 1/14/2026, 12:44:32 AM

Last updated: 1/19/2026, 11:55:46 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats