CVE-2025-40568: CWE-863: Incorrect Authorization in Siemens RUGGEDCOM RST2428P
A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.2), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (All versions < V3.2), SCALANCE XC332 (6GK5332-0GA00-2AC2) (All versions < V3.2), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (All versions < V3.2), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (All versions < V3.2), SCALANCE XC432 (6GK5432-0GR00-2AC2) (All versions < V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (All versions < V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.2). An internal session termination functionality in the web interface of affected products contains an incorrect authorization check vulnerability. This could allow an authenticated remote attacker with "guest" role to terminate legitimate users' sessions.
AI Analysis
Technical Summary
CVE-2025-40568 is a medium-severity vulnerability affecting multiple Siemens industrial networking devices, specifically the RUGGEDCOM RST2428P and a broad range of SCALANCE series switches and routers (all versions prior to V3.2). The vulnerability is classified under CWE-863, indicating an incorrect authorization issue. The root cause lies in the web interface's internal session termination functionality, which improperly checks authorization. This flaw allows an authenticated attacker with only "guest" level privileges to forcibly terminate active sessions of legitimate users. Although the attacker cannot escalate privileges or directly compromise confidentiality or integrity, the ability to disrupt sessions can lead to denial of service conditions for legitimate users, potentially interrupting critical industrial network operations. The vulnerability is remotely exploitable over the network without user interaction, requiring only low privileges (guest role). The CVSS v3.1 base score is 4.3, reflecting a low complexity attack vector with limited impact confined to availability. No known exploits are currently reported in the wild, and Siemens has not yet published patches as of the provided data. The affected devices are widely used in industrial control systems (ICS) and critical infrastructure environments, where network stability and continuous operation are paramount. The vulnerability's exploitation could disrupt monitoring, control, or communication functions within industrial networks, leading to operational downtime or delayed response to critical events.
Potential Impact
For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, transportation, and utilities, this vulnerability poses a risk of operational disruption. Siemens SCALANCE and RUGGEDCOM devices are commonly deployed in industrial environments across Europe, including in power grids, rail networks, and factory automation. An attacker exploiting this flaw could cause denial of service by terminating sessions of authorized personnel, potentially delaying incident response or maintenance activities. While the vulnerability does not allow direct data theft or system takeover, the induced service interruptions could cascade into safety risks or financial losses due to halted industrial processes. Given the reliance on these devices for secure and reliable network communication, even temporary session disruptions can have outsized impacts. Additionally, the vulnerability could be leveraged as part of a multi-stage attack to create confusion or cover other malicious activities. The lack of required user interaction and remote exploitability increases the threat surface, particularly in environments where guest-level access is available or weakly controlled.
Mitigation Recommendations
1. Immediate mitigation involves restricting or disabling guest-level access to the web interfaces of affected Siemens devices. Network segmentation should be enforced to limit access to management interfaces only to trusted administrators. 2. Implement strict access control policies and monitor authentication logs for unusual session termination events that may indicate exploitation attempts. 3. Employ network-level protections such as firewalls and intrusion detection/prevention systems (IDS/IPS) configured to detect anomalous session termination requests or unauthorized access attempts. 4. Coordinate with Siemens for timely updates and apply firmware version 3.2 or later once available, as this version addresses the authorization flaw. 5. Conduct regular security audits and vulnerability assessments of industrial network devices to identify and remediate similar authorization weaknesses. 6. Educate operational technology (OT) personnel about the risks of session hijacking and denial of service through session termination to improve incident detection and response. 7. Where possible, implement multi-factor authentication and session management enhancements to reduce the impact of unauthorized session terminations.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Norway
CVE-2025-40568: CWE-863: Incorrect Authorization in Siemens RUGGEDCOM RST2428P
Description
A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.2), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (All versions < V3.2), SCALANCE XC332 (6GK5332-0GA00-2AC2) (All versions < V3.2), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (All versions < V3.2), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (All versions < V3.2), SCALANCE XC432 (6GK5432-0GR00-2AC2) (All versions < V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (All versions < V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.2). An internal session termination functionality in the web interface of affected products contains an incorrect authorization check vulnerability. This could allow an authenticated remote attacker with "guest" role to terminate legitimate users' sessions.
AI-Powered Analysis
Technical Analysis
CVE-2025-40568 is a medium-severity vulnerability affecting multiple Siemens industrial networking devices, specifically the RUGGEDCOM RST2428P and a broad range of SCALANCE series switches and routers (all versions prior to V3.2). The vulnerability is classified under CWE-863, indicating an incorrect authorization issue. The root cause lies in the web interface's internal session termination functionality, which improperly checks authorization. This flaw allows an authenticated attacker with only "guest" level privileges to forcibly terminate active sessions of legitimate users. Although the attacker cannot escalate privileges or directly compromise confidentiality or integrity, the ability to disrupt sessions can lead to denial of service conditions for legitimate users, potentially interrupting critical industrial network operations. The vulnerability is remotely exploitable over the network without user interaction, requiring only low privileges (guest role). The CVSS v3.1 base score is 4.3, reflecting a low complexity attack vector with limited impact confined to availability. No known exploits are currently reported in the wild, and Siemens has not yet published patches as of the provided data. The affected devices are widely used in industrial control systems (ICS) and critical infrastructure environments, where network stability and continuous operation are paramount. The vulnerability's exploitation could disrupt monitoring, control, or communication functions within industrial networks, leading to operational downtime or delayed response to critical events.
Potential Impact
For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, transportation, and utilities, this vulnerability poses a risk of operational disruption. Siemens SCALANCE and RUGGEDCOM devices are commonly deployed in industrial environments across Europe, including in power grids, rail networks, and factory automation. An attacker exploiting this flaw could cause denial of service by terminating sessions of authorized personnel, potentially delaying incident response or maintenance activities. While the vulnerability does not allow direct data theft or system takeover, the induced service interruptions could cascade into safety risks or financial losses due to halted industrial processes. Given the reliance on these devices for secure and reliable network communication, even temporary session disruptions can have outsized impacts. Additionally, the vulnerability could be leveraged as part of a multi-stage attack to create confusion or cover other malicious activities. The lack of required user interaction and remote exploitability increases the threat surface, particularly in environments where guest-level access is available or weakly controlled.
Mitigation Recommendations
1. Immediate mitigation involves restricting or disabling guest-level access to the web interfaces of affected Siemens devices. Network segmentation should be enforced to limit access to management interfaces only to trusted administrators. 2. Implement strict access control policies and monitor authentication logs for unusual session termination events that may indicate exploitation attempts. 3. Employ network-level protections such as firewalls and intrusion detection/prevention systems (IDS/IPS) configured to detect anomalous session termination requests or unauthorized access attempts. 4. Coordinate with Siemens for timely updates and apply firmware version 3.2 or later once available, as this version addresses the authorization flaw. 5. Conduct regular security audits and vulnerability assessments of industrial network devices to identify and remediate similar authorization weaknesses. 6. Educate operational technology (OT) personnel about the risks of session hijacking and denial of service through session termination to improve incident detection and response. 7. Where possible, implement multi-factor authentication and session management enhancements to reduce the impact of unauthorized session terminations.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2025-04-16T08:20:17.031Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f501b0bd07c39389a6d
Added to database: 6/10/2025, 6:54:08 PM
Last enriched: 7/10/2025, 8:03:50 PM
Last updated: 8/18/2025, 1:49:34 AM
Views: 14
Related Threats
CVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57702: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57701: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.