CVE-2025-41223: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Siemens RUGGEDCOM i800
A vulnerability has been identified in RUGGEDCOM i800 (All versions), RUGGEDCOM i801 (All versions), RUGGEDCOM i802 (All versions), RUGGEDCOM i803 (All versions), RUGGEDCOM M2100 (All versions), RUGGEDCOM M2200 (All versions), RUGGEDCOM M969 (All versions), RUGGEDCOM RMC30 (All versions), RUGGEDCOM RMC8388 V4.X (All versions), RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RP110 (All versions), RUGGEDCOM RS1600 (All versions), RUGGEDCOM RS1600F (All versions), RUGGEDCOM RS1600T (All versions), RUGGEDCOM RS400 (All versions), RUGGEDCOM RS401 (All versions), RUGGEDCOM RS416 (All versions), RUGGEDCOM RS416P (All versions), RUGGEDCOM RS416Pv2 V4.X (All versions), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V4.X (All versions), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS8000 (All versions), RUGGEDCOM RS8000A (All versions), RUGGEDCOM RS8000H (All versions), RUGGEDCOM RS8000T (All versions), RUGGEDCOM RS900 (All versions), RUGGEDCOM RS900 (32M) V4.X (All versions), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (All versions), RUGGEDCOM RS900G (32M) V4.X (All versions), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GP (All versions), RUGGEDCOM RS900L (All versions), RUGGEDCOM RS900M-GETS-C01 (All versions), RUGGEDCOM RS900M-GETS-XX (All versions), RUGGEDCOM RS900M-STND-C01 (All versions), RUGGEDCOM RS900M-STND-XX (All versions), RUGGEDCOM RS900W (All versions), RUGGEDCOM RS910 (All versions), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910W (All versions), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920W (All versions), RUGGEDCOM RS930L (All versions), RUGGEDCOM RS930W (All versions), RUGGEDCOM RS940G (All versions), RUGGEDCOM RS969 (All versions), RUGGEDCOM RSG2100 (All versions), RUGGEDCOM RSG2100 (32M) V4.X (All versions), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (All versions), RUGGEDCOM RSG2100P (32M) V4.X (All versions), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2200 (All versions), RUGGEDCOM RSG2288 V4.X (All versions), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V4.X (All versions), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V4.X (All versions), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V4.X (All versions), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V4.X (All versions), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). The affected devices support the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite, which uses CBC (Cipher Block Chaining) mode that is known to be vulnerable to timing attacks. This could allow an attacker to compromise the integrity and confidentiality of encrypted communications.
AI Analysis
Technical Summary
CVE-2025-41223 is a medium-severity vulnerability affecting a broad range of Siemens RUGGEDCOM devices, including models i800, i801, i802, i803, M2100, M2200, M969, RMC30, RMC8388, RP110, RS1600 series, RS400 series, RS416 series, RS8000 series, RS900 series, RS910 series, RS920 series, RS930 series, RS940G, RS969, RSG2100 series, RSG2200, RSG2288, RSG2300 series, RSG2488, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P, RSL910, RST2228 series, and RST916 series. The vulnerability arises from the use of the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite, which employs AES in Cipher Block Chaining (CBC) mode. CBC mode is known to be susceptible to timing attacks that can leak information about the plaintext by analyzing the time taken to process ciphertext blocks. This weakness can undermine the confidentiality and integrity of encrypted communications between these devices and their clients or management systems. Although the CVSS score is 4.8 (medium), indicating a relatively moderate risk, the vulnerability does not require authentication or user interaction but does require a network attacker to be able to intercept or interact with the TLS sessions. The vulnerability affects all versions of the listed devices, with some exceptions where versions are noted as fixed at or above 5.10.0. No known exploits are currently in the wild, and no patches are explicitly linked yet. The core issue is the use of a cryptographic algorithm that is considered broken or risky (CWE-327), specifically the CBC mode in TLS cipher suites, which modern cryptographic best practices recommend avoiding in favor of AEAD cipher suites like AES-GCM or ChaCha20-Poly1305. Siemens RUGGEDCOM devices are ruggedized industrial network equipment commonly used in critical infrastructure sectors such as energy, transportation, and utilities, making the confidentiality and integrity of their communications essential for operational security.
Potential Impact
For European organizations, particularly those operating critical infrastructure such as power grids, rail networks, and industrial control systems, this vulnerability poses a significant risk to secure communications. Exploitation could allow attackers to decrypt or manipulate sensitive data transmitted over TLS sessions, potentially leading to unauthorized disclosure of operational data or injection of malicious commands. This could disrupt industrial processes, cause data breaches, or facilitate further attacks within the network. Given the widespread deployment of Siemens RUGGEDCOM devices in European critical infrastructure, the vulnerability could impact national security and public safety. The medium CVSS score reflects that while exploitation is not trivial (due to the requirement of network access and the need to perform timing attacks), the potential consequences on confidentiality and integrity are meaningful. The lack of known exploits suggests that immediate widespread attacks are unlikely, but the vulnerability should be addressed proactively to prevent future exploitation. The vulnerability does not affect availability directly, so denial-of-service impacts are not expected from this issue alone.
Mitigation Recommendations
European organizations should prioritize upgrading affected Siemens RUGGEDCOM devices to firmware versions 5.10.0 or later where available, as these versions presumably address the vulnerability by disabling or replacing the vulnerable CBC cipher suites. If immediate upgrades are not feasible, organizations should configure devices and network equipment to disable the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite and enforce the use of more secure cipher suites such as those based on AES-GCM or ChaCha20-Poly1305. Network segmentation and strict access controls should be implemented to limit exposure of these devices to untrusted networks, reducing the risk of an attacker being able to intercept or manipulate TLS traffic. Monitoring network traffic for anomalous TLS handshake patterns or timing attack indicators can provide early detection of exploitation attempts. Additionally, organizations should engage with Siemens support to obtain official patches or mitigation guidance and maintain awareness of updates regarding this CVE. Regular cryptographic audits of industrial devices should be conducted to ensure compliance with current best practices and to identify other potential cryptographic weaknesses.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2025-41223: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Siemens RUGGEDCOM i800
Description
A vulnerability has been identified in RUGGEDCOM i800 (All versions), RUGGEDCOM i801 (All versions), RUGGEDCOM i802 (All versions), RUGGEDCOM i803 (All versions), RUGGEDCOM M2100 (All versions), RUGGEDCOM M2200 (All versions), RUGGEDCOM M969 (All versions), RUGGEDCOM RMC30 (All versions), RUGGEDCOM RMC8388 V4.X (All versions), RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RP110 (All versions), RUGGEDCOM RS1600 (All versions), RUGGEDCOM RS1600F (All versions), RUGGEDCOM RS1600T (All versions), RUGGEDCOM RS400 (All versions), RUGGEDCOM RS401 (All versions), RUGGEDCOM RS416 (All versions), RUGGEDCOM RS416P (All versions), RUGGEDCOM RS416Pv2 V4.X (All versions), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V4.X (All versions), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS8000 (All versions), RUGGEDCOM RS8000A (All versions), RUGGEDCOM RS8000H (All versions), RUGGEDCOM RS8000T (All versions), RUGGEDCOM RS900 (All versions), RUGGEDCOM RS900 (32M) V4.X (All versions), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (All versions), RUGGEDCOM RS900G (32M) V4.X (All versions), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GP (All versions), RUGGEDCOM RS900L (All versions), RUGGEDCOM RS900M-GETS-C01 (All versions), RUGGEDCOM RS900M-GETS-XX (All versions), RUGGEDCOM RS900M-STND-C01 (All versions), RUGGEDCOM RS900M-STND-XX (All versions), RUGGEDCOM RS900W (All versions), RUGGEDCOM RS910 (All versions), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910W (All versions), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920W (All versions), RUGGEDCOM RS930L (All versions), RUGGEDCOM RS930W (All versions), RUGGEDCOM RS940G (All versions), RUGGEDCOM RS969 (All versions), RUGGEDCOM RSG2100 (All versions), RUGGEDCOM RSG2100 (32M) V4.X (All versions), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (All versions), RUGGEDCOM RSG2100P (32M) V4.X (All versions), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2200 (All versions), RUGGEDCOM RSG2288 V4.X (All versions), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V4.X (All versions), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V4.X (All versions), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V4.X (All versions), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V4.X (All versions), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). The affected devices support the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite, which uses CBC (Cipher Block Chaining) mode that is known to be vulnerable to timing attacks. This could allow an attacker to compromise the integrity and confidentiality of encrypted communications.
AI-Powered Analysis
Technical Analysis
CVE-2025-41223 is a medium-severity vulnerability affecting a broad range of Siemens RUGGEDCOM devices, including models i800, i801, i802, i803, M2100, M2200, M969, RMC30, RMC8388, RP110, RS1600 series, RS400 series, RS416 series, RS8000 series, RS900 series, RS910 series, RS920 series, RS930 series, RS940G, RS969, RSG2100 series, RSG2200, RSG2288, RSG2300 series, RSG2488, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P, RSL910, RST2228 series, and RST916 series. The vulnerability arises from the use of the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite, which employs AES in Cipher Block Chaining (CBC) mode. CBC mode is known to be susceptible to timing attacks that can leak information about the plaintext by analyzing the time taken to process ciphertext blocks. This weakness can undermine the confidentiality and integrity of encrypted communications between these devices and their clients or management systems. Although the CVSS score is 4.8 (medium), indicating a relatively moderate risk, the vulnerability does not require authentication or user interaction but does require a network attacker to be able to intercept or interact with the TLS sessions. The vulnerability affects all versions of the listed devices, with some exceptions where versions are noted as fixed at or above 5.10.0. No known exploits are currently in the wild, and no patches are explicitly linked yet. The core issue is the use of a cryptographic algorithm that is considered broken or risky (CWE-327), specifically the CBC mode in TLS cipher suites, which modern cryptographic best practices recommend avoiding in favor of AEAD cipher suites like AES-GCM or ChaCha20-Poly1305. Siemens RUGGEDCOM devices are ruggedized industrial network equipment commonly used in critical infrastructure sectors such as energy, transportation, and utilities, making the confidentiality and integrity of their communications essential for operational security.
Potential Impact
For European organizations, particularly those operating critical infrastructure such as power grids, rail networks, and industrial control systems, this vulnerability poses a significant risk to secure communications. Exploitation could allow attackers to decrypt or manipulate sensitive data transmitted over TLS sessions, potentially leading to unauthorized disclosure of operational data or injection of malicious commands. This could disrupt industrial processes, cause data breaches, or facilitate further attacks within the network. Given the widespread deployment of Siemens RUGGEDCOM devices in European critical infrastructure, the vulnerability could impact national security and public safety. The medium CVSS score reflects that while exploitation is not trivial (due to the requirement of network access and the need to perform timing attacks), the potential consequences on confidentiality and integrity are meaningful. The lack of known exploits suggests that immediate widespread attacks are unlikely, but the vulnerability should be addressed proactively to prevent future exploitation. The vulnerability does not affect availability directly, so denial-of-service impacts are not expected from this issue alone.
Mitigation Recommendations
European organizations should prioritize upgrading affected Siemens RUGGEDCOM devices to firmware versions 5.10.0 or later where available, as these versions presumably address the vulnerability by disabling or replacing the vulnerable CBC cipher suites. If immediate upgrades are not feasible, organizations should configure devices and network equipment to disable the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite and enforce the use of more secure cipher suites such as those based on AES-GCM or ChaCha20-Poly1305. Network segmentation and strict access controls should be implemented to limit exposure of these devices to untrusted networks, reducing the risk of an attacker being able to intercept or manipulate TLS traffic. Monitoring network traffic for anomalous TLS handshake patterns or timing attack indicators can provide early detection of exploitation attempts. Additionally, organizations should engage with Siemens support to obtain official patches or mitigation guidance and maintain awareness of updates regarding this CVE. Regular cryptographic audits of industrial devices should be conducted to ensure compliance with current best practices and to identify other potential cryptographic weaknesses.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- siemens
- Date Reserved
- 2025-04-16T09:27:14.282Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686cf5646f40f0eb72f3f627
Added to database: 7/8/2025, 10:39:32 AM
Last enriched: 7/8/2025, 10:56:27 AM
Last updated: 7/8/2025, 1:08:21 PM
Views: 3
Related Threats
CVE-2025-7181: Unrestricted Upload in code-projects Staff Audit System
MediumCVE-2025-36600: CWE-1257: Improper Access Control Applied to Mirrored or Aliased Memory Regions in Dell Client Platform BIOS
HighCVE-2025-29267: n/a
UnknownCVE-2025-47422: n/a
CriticalCVE-2025-7345: Out-of-bounds Write in Red Hat Red Hat Enterprise Linux 10
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.