Skip to main content

CVE-2025-40802: CWE-400: Uncontrolled Resource Consumption in Siemens RUGGEDCOM RST2428P

Low
VulnerabilityCVE-2025-40802cvecve-2025-40802cwe-400
Published: Tue Sep 09 2025 (09/09/2025, 08:48:06 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: RUGGEDCOM RST2428P

Description

A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions). The affected device may be susceptible to resource exhaustion when subjected to high volumes of query requests. This could allow an attacker to cause a temporary denial of service, with the system recovering once the activity stops.

AI-Powered Analysis

AILast updated: 09/09/2025, 08:59:52 UTC

Technical Analysis

CVE-2025-40802 is a vulnerability identified in the Siemens RUGGEDCOM RST2428P device, a ruggedized industrial network switch commonly used in critical infrastructure environments such as utilities, transportation, and industrial automation. The vulnerability is classified under CWE-400, which pertains to uncontrolled resource consumption. Specifically, the device is susceptible to resource exhaustion when subjected to a high volume of query requests. This means that an attacker who can send a large number of queries to the device could overwhelm its processing capabilities, leading to a temporary denial of service (DoS). The device does not crash permanently but becomes unresponsive until the attack traffic subsides, after which it recovers normal operation. The CVSS v3.1 base score is 3.1, indicating a low severity level. The vector string (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) shows that the attack requires adjacent network access (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts only availability with low impact (A:L). No known exploits are currently in the wild, and no patches have been released yet. The vulnerability affects all versions of the RUGGEDCOM RST2428P device. Given the device's role in industrial networks, this vulnerability could be leveraged to disrupt network communications temporarily, potentially affecting operational continuity in critical infrastructure sectors.

Potential Impact

For European organizations, particularly those operating in critical infrastructure sectors such as energy, transportation, and manufacturing, this vulnerability poses a risk of temporary service disruption. The RUGGEDCOM RST2428P is widely deployed in industrial control systems (ICS) and operational technology (OT) networks, which are essential for maintaining continuous operations. A successful exploitation could lead to temporary denial of service conditions, causing delays or interruptions in data transmission and network management functions. While the impact is limited to availability and is temporary, even short outages in critical infrastructure can have cascading effects, including safety risks, financial losses, and regulatory non-compliance. The requirement for adjacent network access and high attack complexity reduces the likelihood of widespread exploitation but does not eliminate the risk, especially in environments where network segmentation is weak or where attackers have gained a foothold in the local network. European organizations must consider the potential operational disruptions and the importance of maintaining resilient industrial networks.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should implement the following specific measures: 1) Network Segmentation: Ensure strict segmentation of OT and ICS networks from corporate and external networks to limit attacker access to the device's local network. 2) Rate Limiting and Traffic Filtering: Deploy network devices capable of detecting and limiting excessive query requests to the RUGGEDCOM device, preventing resource exhaustion. 3) Monitoring and Anomaly Detection: Implement continuous monitoring of network traffic to identify unusual spikes in query requests targeting the RUGGEDCOM RST2428P. 4) Access Control: Restrict management and query access to the device to authorized personnel and systems only, using strong authentication and access control lists. 5) Vendor Coordination: Engage with Siemens for updates on patches or firmware upgrades addressing this vulnerability and plan timely deployment once available. 6) Incident Response Planning: Prepare response procedures for temporary DoS events affecting industrial switches to minimize operational impact. 7) Physical Security: Ensure physical security controls to prevent unauthorized local network access to the device. These measures go beyond generic advice by focusing on the specific attack vector (high volume query requests) and the operational context of industrial network devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-04-16T08:50:26.973Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bfec1952647a71632fbdab

Added to database: 9/9/2025, 8:58:01 AM

Last enriched: 9/9/2025, 8:59:52 AM

Last updated: 9/9/2025, 9:34:53 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats