Skip to main content

CVE-2025-40568: CWE-863: Incorrect Authorization in Siemens RUGGEDCOM RST2428P

Medium
VulnerabilityCVE-2025-40568cvecve-2025-40568cwe-863
Published: Tue Jun 10 2025 (06/10/2025, 15:17:31 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: RUGGEDCOM RST2428P

Description

A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions < V3.2), SCALANCE XC316-8 (6GK5324-8TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 (6GK5328-4TS00-2AC2) (All versions < V3.2), SCALANCE XC324-4 EEC (6GK5328-4TS00-2EC2) (All versions < V3.2), SCALANCE XC332 (6GK5332-0GA00-2AC2) (All versions < V3.2), SCALANCE XC416-8 (6GK5424-8TR00-2AC2) (All versions < V3.2), SCALANCE XC424-4 (6GK5428-4TR00-2AC2) (All versions < V3.2), SCALANCE XC432 (6GK5432-0GR00-2AC2) (All versions < V3.2), SCALANCE XCH328 (6GK5328-4TS01-2EC2) (All versions < V3.2), SCALANCE XCM324 (6GK5324-8TS01-2AC2) (All versions < V3.2), SCALANCE XCM328 (6GK5328-4TS01-2AC2) (All versions < V3.2), SCALANCE XCM332 (6GK5332-0GA01-2AC2) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-2AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-3AR3) (All versions < V3.2), SCALANCE XR302-32 (6GK5334-5TS00-4AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-2AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-3AR3) (All versions < V3.2), SCALANCE XR322-12 (6GK5334-3TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-2AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-3AR3) (All versions < V3.2), SCALANCE XR326-8 (6GK5334-2TS00-4AR3) (All versions < V3.2), SCALANCE XR326-8 EEC (6GK5334-2TS00-2ER3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-2AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-3AR3) (All versions < V3.2), SCALANCE XR502-32 (6GK5534-5TR00-4AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-2AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-3AR3) (All versions < V3.2), SCALANCE XR522-12 (6GK5534-3TR00-4AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-2AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-3AR3) (All versions < V3.2), SCALANCE XR526-8 (6GK5534-2TR00-4AR3) (All versions < V3.2), SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-3AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (24V DC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-2AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3) (All versions < V3.2), SCALANCE XRM334 (2x230V AC, 2x10G, 24xSFP, 8xSFP+) (6GK5334-5TS01-4AR3) (All versions < V3.2). An internal session termination functionality in the web interface of affected products contains an incorrect authorization check vulnerability. This could allow an authenticated remote attacker with "guest" role to terminate legitimate users' sessions.

AI-Powered Analysis

AILast updated: 07/10/2025, 20:03:50 UTC

Technical Analysis

CVE-2025-40568 is a medium-severity vulnerability affecting multiple Siemens industrial networking devices, specifically the RUGGEDCOM RST2428P and a broad range of SCALANCE series switches and routers (all versions prior to V3.2). The vulnerability is classified under CWE-863, indicating an incorrect authorization issue. The root cause lies in the web interface's internal session termination functionality, which improperly checks authorization. This flaw allows an authenticated attacker with only "guest" level privileges to forcibly terminate active sessions of legitimate users. Although the attacker cannot escalate privileges or directly compromise confidentiality or integrity, the ability to disrupt sessions can lead to denial of service conditions for legitimate users, potentially interrupting critical industrial network operations. The vulnerability is remotely exploitable over the network without user interaction, requiring only low privileges (guest role). The CVSS v3.1 base score is 4.3, reflecting a low complexity attack vector with limited impact confined to availability. No known exploits are currently reported in the wild, and Siemens has not yet published patches as of the provided data. The affected devices are widely used in industrial control systems (ICS) and critical infrastructure environments, where network stability and continuous operation are paramount. The vulnerability's exploitation could disrupt monitoring, control, or communication functions within industrial networks, leading to operational downtime or delayed response to critical events.

Potential Impact

For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, transportation, and utilities, this vulnerability poses a risk of operational disruption. Siemens SCALANCE and RUGGEDCOM devices are commonly deployed in industrial environments across Europe, including in power grids, rail networks, and factory automation. An attacker exploiting this flaw could cause denial of service by terminating sessions of authorized personnel, potentially delaying incident response or maintenance activities. While the vulnerability does not allow direct data theft or system takeover, the induced service interruptions could cascade into safety risks or financial losses due to halted industrial processes. Given the reliance on these devices for secure and reliable network communication, even temporary session disruptions can have outsized impacts. Additionally, the vulnerability could be leveraged as part of a multi-stage attack to create confusion or cover other malicious activities. The lack of required user interaction and remote exploitability increases the threat surface, particularly in environments where guest-level access is available or weakly controlled.

Mitigation Recommendations

1. Immediate mitigation involves restricting or disabling guest-level access to the web interfaces of affected Siemens devices. Network segmentation should be enforced to limit access to management interfaces only to trusted administrators. 2. Implement strict access control policies and monitor authentication logs for unusual session termination events that may indicate exploitation attempts. 3. Employ network-level protections such as firewalls and intrusion detection/prevention systems (IDS/IPS) configured to detect anomalous session termination requests or unauthorized access attempts. 4. Coordinate with Siemens for timely updates and apply firmware version 3.2 or later once available, as this version addresses the authorization flaw. 5. Conduct regular security audits and vulnerability assessments of industrial network devices to identify and remediate similar authorization weaknesses. 6. Educate operational technology (OT) personnel about the risks of session hijacking and denial of service through session termination to improve incident detection and response. 7. Where possible, implement multi-factor authentication and session management enhancements to reduce the impact of unauthorized session terminations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-04-16T08:20:17.031Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f501b0bd07c39389a6d

Added to database: 6/10/2025, 6:54:08 PM

Last enriched: 7/10/2025, 8:03:50 PM

Last updated: 8/18/2025, 1:49:34 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats