Skip to main content

CVE-2025-41223: CWE-327: Use of a Broken or Risky Cryptographic Algorithm in Siemens RUGGEDCOM i800

Medium
VulnerabilityCVE-2025-41223cvecve-2025-41223cwe-327
Published: Tue Jul 08 2025 (07/08/2025, 10:35:06 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: RUGGEDCOM i800

Description

A vulnerability has been identified in RUGGEDCOM i800 (All versions), RUGGEDCOM i801 (All versions), RUGGEDCOM i802 (All versions), RUGGEDCOM i803 (All versions), RUGGEDCOM M2100 (All versions), RUGGEDCOM M2200 (All versions), RUGGEDCOM M969 (All versions), RUGGEDCOM RMC30 (All versions), RUGGEDCOM RMC8388 V4.X (All versions), RUGGEDCOM RMC8388 V5.X (All versions < V5.10.0), RUGGEDCOM RP110 (All versions), RUGGEDCOM RS1600 (All versions), RUGGEDCOM RS1600F (All versions), RUGGEDCOM RS1600T (All versions), RUGGEDCOM RS400 (All versions), RUGGEDCOM RS401 (All versions), RUGGEDCOM RS416 (All versions), RUGGEDCOM RS416P (All versions), RUGGEDCOM RS416Pv2 V4.X (All versions), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.0), RUGGEDCOM RS416v2 V4.X (All versions), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.0), RUGGEDCOM RS8000 (All versions), RUGGEDCOM RS8000A (All versions), RUGGEDCOM RS8000H (All versions), RUGGEDCOM RS8000T (All versions), RUGGEDCOM RS900 (All versions), RUGGEDCOM RS900 (32M) V4.X (All versions), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900G (All versions), RUGGEDCOM RS900G (32M) V4.X (All versions), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RS900GP (All versions), RUGGEDCOM RS900L (All versions), RUGGEDCOM RS900M-GETS-C01 (All versions), RUGGEDCOM RS900M-GETS-XX (All versions), RUGGEDCOM RS900M-STND-C01 (All versions), RUGGEDCOM RS900M-STND-XX (All versions), RUGGEDCOM RS900W (All versions), RUGGEDCOM RS910 (All versions), RUGGEDCOM RS910L (All versions), RUGGEDCOM RS910W (All versions), RUGGEDCOM RS920L (All versions), RUGGEDCOM RS920W (All versions), RUGGEDCOM RS930L (All versions), RUGGEDCOM RS930W (All versions), RUGGEDCOM RS940G (All versions), RUGGEDCOM RS969 (All versions), RUGGEDCOM RSG2100 (All versions), RUGGEDCOM RSG2100 (32M) V4.X (All versions), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2100P (All versions), RUGGEDCOM RSG2100P (32M) V4.X (All versions), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.0), RUGGEDCOM RSG2200 (All versions), RUGGEDCOM RSG2288 V4.X (All versions), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300 V4.X (All versions), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.0), RUGGEDCOM RSG2300P V4.X (All versions), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.0), RUGGEDCOM RSG2488 V4.X (All versions), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.0), RUGGEDCOM RSG907R (All versions < V5.10.0), RUGGEDCOM RSG908C (All versions < V5.10.0), RUGGEDCOM RSG909R (All versions < V5.10.0), RUGGEDCOM RSG910C (All versions < V5.10.0), RUGGEDCOM RSG920P V4.X (All versions), RUGGEDCOM RSG920P V5.X (All versions < V5.10.0), RUGGEDCOM RSL910 (All versions < V5.10.0), RUGGEDCOM RST2228 (All versions < V5.10.0), RUGGEDCOM RST2228P (All versions < V5.10.0), RUGGEDCOM RST916C (All versions < V5.10.0), RUGGEDCOM RST916P (All versions < V5.10.0). The affected devices support the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite, which uses CBC (Cipher Block Chaining) mode that is known to be vulnerable to timing attacks. This could allow an attacker to compromise the integrity and confidentiality of encrypted communications.

AI-Powered Analysis

AILast updated: 07/15/2025, 22:01:48 UTC

Technical Analysis

CVE-2025-41223 is a medium-severity vulnerability affecting a broad range of Siemens RUGGEDCOM devices, including models i800, i801, i802, i803, M2100, M2200, M969, RMC30, RMC8388, RP110, RS1600 series, RS400 series, RS416 series, RS8000 series, RS900 series, RS910 series, RS920 series, RS930 series, RS940G, RS969, RSG2100 series, RSG2200, RSG2288, RSG2300 series, RSG2488, RSG907R, RSG908C, RSG909R, RSG910C, RSG920P, RSL910, RST2228 series, RST916 series, and others, across all versions or versions prior to 5.10.0 where specified. The vulnerability arises from the use of the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite, which employs AES in CBC (Cipher Block Chaining) mode. CBC mode is known to be susceptible to timing attacks, which can potentially allow an attacker to infer plaintext information by analyzing the time taken to process cryptographic operations. This weakness compromises the confidentiality and integrity of encrypted communications between devices and their clients or peers. Although no known exploits are currently reported in the wild, the vulnerability exists due to the use of a cryptographic algorithm considered broken or risky (CWE-327). The CVSS v3.1 base score is 4.8 (medium), reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and limited confidentiality and integrity impact without availability impact. The vulnerability affects critical industrial networking equipment often deployed in operational technology (OT) environments such as utilities, transportation, and industrial control systems. The broad range of affected devices and versions indicates a systemic cryptographic design issue requiring patching or configuration changes to disable or replace the vulnerable cipher suite with more secure alternatives such as AES-GCM modes. Siemens has not yet published patches for all affected versions, emphasizing the need for immediate mitigation steps to reduce exposure.

Potential Impact

For European organizations, especially those operating critical infrastructure sectors like energy, transportation, manufacturing, and utilities, this vulnerability poses a significant risk. RUGGEDCOM devices are widely used in industrial and utility networks across Europe due to their rugged design and reliability in harsh environments. Exploitation of this vulnerability could allow attackers to intercept or manipulate encrypted communications, potentially leading to unauthorized data disclosure, command injection, or disruption of industrial processes. Given the critical nature of these systems, any compromise could result in operational downtime, safety hazards, regulatory non-compliance, and reputational damage. The medium CVSS score may underestimate the real-world impact in OT environments where confidentiality breaches can cascade into safety and availability issues. European organizations face increased risk due to the high deployment density of Siemens RUGGEDCOM devices and the strategic importance of sectors relying on them. Additionally, the vulnerability's exploitation does not require authentication or user interaction, increasing the attack surface. Although no active exploits are reported, the known weakness in CBC mode encryption and the availability of timing attack techniques make this a credible threat that must be addressed proactively.

Mitigation Recommendations

1. Immediate network segmentation: Isolate affected RUGGEDCOM devices from untrusted networks to limit exposure to remote attackers. 2. Disable the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite on all affected devices if configuration options allow, replacing it with stronger cipher suites such as those using AES-GCM (e.g., TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256). 3. Apply firmware updates from Siemens as soon as they become available, prioritizing versions 5.10.0 or later where the vulnerability is addressed. 4. Employ network monitoring and anomaly detection focused on unusual TLS handshake patterns or timing anomalies that could indicate exploitation attempts. 5. Conduct regular cryptographic audits of OT devices to identify and remediate use of deprecated or risky algorithms. 6. Engage with Siemens support to obtain guidance on interim mitigations and patch timelines. 7. Implement strict access controls and VPNs for remote management to reduce attack vectors. 8. Plan for device replacement or upgrade if patches are unavailable or devices are end-of-life. These steps go beyond generic advice by focusing on cryptographic configuration, network architecture, and vendor coordination specific to Siemens RUGGEDCOM devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2025-04-16T09:27:14.282Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686cf5646f40f0eb72f3f627

Added to database: 7/8/2025, 10:39:32 AM

Last enriched: 7/15/2025, 10:01:48 PM

Last updated: 8/20/2025, 3:43:01 AM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats