CVE-2025-40803: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens RUGGEDCOM RST2428P
A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions). The affected device exposes certain non-critical information from the device. This could allow an unauthenticated attacker to access sensitive data, potentially leading to a breach of confidentiality.
AI Analysis
Technical Summary
CVE-2025-40803 is a vulnerability identified in the Siemens RUGGEDCOM RST2428P device, a ruggedized industrial networking product commonly used in critical infrastructure and industrial control systems. The vulnerability is classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. Specifically, this flaw allows an unauthenticated attacker to access certain non-critical but sensitive information from the device without requiring any user interaction. The vulnerability affects all versions of the RUGGEDCOM RST2428P (6GK6242-6PA00). According to the CVSS v3.1 scoring, the vulnerability has a low severity score of 3.1, with the vector indicating that the attack requires adjacent network access (AV:A), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been published yet. The exposed information is described as non-critical but sensitive, which could potentially aid attackers in reconnaissance or further attacks if combined with other vulnerabilities or weaknesses in the environment. Siemens has reserved the CVE and published the details, indicating awareness and potential forthcoming remediation.
Potential Impact
For European organizations, particularly those operating critical infrastructure such as energy, transportation, and industrial manufacturing sectors, this vulnerability poses a confidentiality risk. Although the exposed information is characterized as non-critical, any leakage of sensitive device data can facilitate targeted attacks, including social engineering, network mapping, or exploitation of other vulnerabilities. Given the RUGGEDCOM RST2428P's role in industrial networks, unauthorized disclosure could undermine operational security and trust in network integrity. The low severity and high attack complexity reduce the immediate risk, but the lack of authentication requirement means that any attacker with access to the adjacent network segment could attempt exploitation. This is particularly relevant for organizations with less segmented or poorly secured industrial networks. The absence of known exploits reduces urgency but does not eliminate the risk, especially as threat actors often develop exploits post-disclosure. European entities relying on Siemens industrial networking equipment should consider this vulnerability in their risk assessments and incident response planning.
Mitigation Recommendations
1. Network Segmentation: Ensure that RUGGEDCOM RST2428P devices are placed within properly segmented and isolated network zones, restricting access to trusted devices only. 2. Access Controls: Implement strict access control lists (ACLs) and firewall rules to limit adjacent network access to these devices, minimizing exposure to unauthorized actors. 3. Monitoring and Logging: Enable detailed logging and continuous monitoring of network traffic to and from RUGGEDCOM devices to detect unusual access patterns or reconnaissance attempts. 4. Vendor Coordination: Engage with Siemens support channels to obtain updates on patches or firmware upgrades addressing this vulnerability and apply them promptly once available. 5. Incident Response Preparedness: Update incident response plans to include scenarios involving information disclosure from industrial devices and conduct tabletop exercises accordingly. 6. Network Hardening: Disable unnecessary services and interfaces on the RUGGEDCOM devices to reduce the attack surface. 7. Physical Security: Ensure physical security controls are in place to prevent unauthorized local access to the devices, which could compound network-based risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-40803: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens RUGGEDCOM RST2428P
Description
A vulnerability has been identified in RUGGEDCOM RST2428P (6GK6242-6PA00) (All versions). The affected device exposes certain non-critical information from the device. This could allow an unauthenticated attacker to access sensitive data, potentially leading to a breach of confidentiality.
AI-Powered Analysis
Technical Analysis
CVE-2025-40803 is a vulnerability identified in the Siemens RUGGEDCOM RST2428P device, a ruggedized industrial networking product commonly used in critical infrastructure and industrial control systems. The vulnerability is classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. Specifically, this flaw allows an unauthenticated attacker to access certain non-critical but sensitive information from the device without requiring any user interaction. The vulnerability affects all versions of the RUGGEDCOM RST2428P (6GK6242-6PA00). According to the CVSS v3.1 scoring, the vulnerability has a low severity score of 3.1, with the vector indicating that the attack requires adjacent network access (AV:A), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been published yet. The exposed information is described as non-critical but sensitive, which could potentially aid attackers in reconnaissance or further attacks if combined with other vulnerabilities or weaknesses in the environment. Siemens has reserved the CVE and published the details, indicating awareness and potential forthcoming remediation.
Potential Impact
For European organizations, particularly those operating critical infrastructure such as energy, transportation, and industrial manufacturing sectors, this vulnerability poses a confidentiality risk. Although the exposed information is characterized as non-critical, any leakage of sensitive device data can facilitate targeted attacks, including social engineering, network mapping, or exploitation of other vulnerabilities. Given the RUGGEDCOM RST2428P's role in industrial networks, unauthorized disclosure could undermine operational security and trust in network integrity. The low severity and high attack complexity reduce the immediate risk, but the lack of authentication requirement means that any attacker with access to the adjacent network segment could attempt exploitation. This is particularly relevant for organizations with less segmented or poorly secured industrial networks. The absence of known exploits reduces urgency but does not eliminate the risk, especially as threat actors often develop exploits post-disclosure. European entities relying on Siemens industrial networking equipment should consider this vulnerability in their risk assessments and incident response planning.
Mitigation Recommendations
1. Network Segmentation: Ensure that RUGGEDCOM RST2428P devices are placed within properly segmented and isolated network zones, restricting access to trusted devices only. 2. Access Controls: Implement strict access control lists (ACLs) and firewall rules to limit adjacent network access to these devices, minimizing exposure to unauthorized actors. 3. Monitoring and Logging: Enable detailed logging and continuous monitoring of network traffic to and from RUGGEDCOM devices to detect unusual access patterns or reconnaissance attempts. 4. Vendor Coordination: Engage with Siemens support channels to obtain updates on patches or firmware upgrades addressing this vulnerability and apply them promptly once available. 5. Incident Response Preparedness: Update incident response plans to include scenarios involving information disclosure from industrial devices and conduct tabletop exercises accordingly. 6. Network Hardening: Disable unnecessary services and interfaces on the RUGGEDCOM devices to reduce the attack surface. 7. Physical Security: Ensure physical security controls are in place to prevent unauthorized local access to the devices, which could compound network-based risks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2025-04-16T08:50:26.973Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bfec1952647a71632fbdae
Added to database: 9/9/2025, 8:58:01 AM
Last enriched: 9/9/2025, 8:59:41 AM
Last updated: 9/9/2025, 9:33:42 PM
Views: 4
Related Threats
CVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21336: CWE-203: Observable Discrepancy in Microsoft Windows 10 Version 1809
MediumCVE-2025-21332: CWE-41: Improper Resolution of Path Equivalence in Microsoft Windows Server 2025
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.