CVE-2025-40935 (GCVE-0-2025-40935)
Vulnerability from cvelistv5
Published
2025-12-09 10:44
Modified
2025-12-09 15:35
CWE
  • CWE-20 - Improper Input Validation
Summary
A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.10.1), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.1), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.1), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.1), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.1), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.1), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.1), RUGGEDCOM RSG907R (All versions < V5.10.1), RUGGEDCOM RSG908C (All versions < V5.10.1), RUGGEDCOM RSG909R (All versions < V5.10.1), RUGGEDCOM RSG910C (All versions < V5.10.1), RUGGEDCOM RSG920P V5.X (All versions < V5.10.1), RUGGEDCOM RSL910 (All versions < V5.10.1), RUGGEDCOM RST2228 (All versions < V5.10.1), RUGGEDCOM RST2228P (All versions < V5.10.1), RUGGEDCOM RST916C (All versions < V5.10.1), RUGGEDCOM RST916P (All versions < V5.10.1). Affected devices do not properly validate input during the TLS certificate upload process of the web service. This could allow an authenticated remote attacker to trigger a device crash and reboot, leading to a temporary Denial of Service on the device.
Impacted products
Vendor Product Version
Siemens RUGGEDCOM RMC8388 V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RS416Pv2 V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RS416v2 V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RS900 (32M) V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RS900G (32M) V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSG2100 (32M) V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSG2100P (32M) V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSG2288 V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSG2300 V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSG2300P V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSG2488 V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSG907R Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSG908C Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSG909R Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSG910C Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSG920P V5.X Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RSL910 Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RST2228 Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RST2228P Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RST916C Version: 0   < V5.10.1
Create a notification for this product.
   Siemens RUGGEDCOM RST916P Version: 0   < V5.10.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-40935",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-09T15:34:03.895420Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-09T15:35:36.265Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RMC8388 V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RS416Pv2 V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RS416v2 V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RS900 (32M) V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RS900G (32M) V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSG2100 (32M) V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSG2100P (32M) V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSG2288 V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSG2300 V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSG2300P V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSG2488 V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSG907R",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSG908C",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSG909R",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSG910C",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSG920P V5.X",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RSL910",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RST2228",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RST2228P",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RST916C",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unknown",
          "product": "RUGGEDCOM RST916P",
          "vendor": "Siemens",
          "versions": [
            {
              "lessThan": "V5.10.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS416Pv2 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS416v2 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS900 (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS900G (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2100 (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2100P (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2288 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2300 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2300P V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2488 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG907R (All versions \u003c V5.10.1), RUGGEDCOM RSG908C (All versions \u003c V5.10.1), RUGGEDCOM RSG909R (All versions \u003c V5.10.1), RUGGEDCOM RSG910C (All versions \u003c V5.10.1), RUGGEDCOM RSG920P V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSL910 (All versions \u003c V5.10.1), RUGGEDCOM RST2228 (All versions \u003c V5.10.1), RUGGEDCOM RST2228P (All versions \u003c V5.10.1), RUGGEDCOM RST916C (All versions \u003c V5.10.1), RUGGEDCOM RST916P (All versions \u003c V5.10.1). Affected devices do not properly validate input during the TLS certificate upload process of the web service. This could allow an authenticated remote attacker to trigger a device crash and reboot, leading to a temporary Denial of Service on the device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-09T10:44:34.649Z",
        "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
        "shortName": "siemens"
      },
      "references": [
        {
          "url": "https://cert-portal.siemens.com/productcert/html/ssa-763474.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
    "assignerShortName": "siemens",
    "cveId": "CVE-2025-40935",
    "datePublished": "2025-12-09T10:44:34.649Z",
    "dateReserved": "2025-04-16T09:06:15.878Z",
    "dateUpdated": "2025-12-09T15:35:36.265Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-40935\",\"sourceIdentifier\":\"productcert@siemens.com\",\"published\":\"2025-12-09T16:17:47.070\",\"lastModified\":\"2025-12-09T18:36:53.557\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS416Pv2 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS416v2 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS900 (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS900G (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2100 (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2100P (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2288 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2300 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2300P V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2488 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG907R (All versions \u003c V5.10.1), RUGGEDCOM RSG908C (All versions \u003c V5.10.1), RUGGEDCOM RSG909R (All versions \u003c V5.10.1), RUGGEDCOM RSG910C (All versions \u003c V5.10.1), RUGGEDCOM RSG920P V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSL910 (All versions \u003c V5.10.1), RUGGEDCOM RST2228 (All versions \u003c V5.10.1), RUGGEDCOM RST2228P (All versions \u003c V5.10.1), RUGGEDCOM RST916C (All versions \u003c V5.10.1), RUGGEDCOM RST916P (All versions \u003c V5.10.1). Affected devices do not properly validate input during the TLS certificate upload process of the web service. This could allow an authenticated remote attacker to trigger a device crash and reboot, leading to a temporary Denial of Service on the device.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"productcert@siemens.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/html/ssa-763474.html\",\"source\":\"productcert@siemens.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-40935\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-09T15:34:03.895420Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-09T15:35:30.304Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\"}}, {\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N\"}}], \"affected\": [{\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RMC8388 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS416Pv2 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS416v2 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS900 (32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RS900G (32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2100 (32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2100P (32M) V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2288 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2300 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2300P V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG2488 V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG907R\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG908C\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG909R\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG910C\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSG920P V5.X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RSL910\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RST2228\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RST2228P\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RST916C\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"vendor\": \"Siemens\", \"product\": \"RUGGEDCOM RST916P\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"V5.10.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://cert-portal.siemens.com/productcert/html/ssa-763474.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS416Pv2 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS416v2 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS900 (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RS900G (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2100 (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2100P (32M) V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2288 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2300 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2300P V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG2488 V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSG907R (All versions \u003c V5.10.1), RUGGEDCOM RSG908C (All versions \u003c V5.10.1), RUGGEDCOM RSG909R (All versions \u003c V5.10.1), RUGGEDCOM RSG910C (All versions \u003c V5.10.1), RUGGEDCOM RSG920P V5.X (All versions \u003c V5.10.1), RUGGEDCOM RSL910 (All versions \u003c V5.10.1), RUGGEDCOM RST2228 (All versions \u003c V5.10.1), RUGGEDCOM RST2228P (All versions \u003c V5.10.1), RUGGEDCOM RST916C (All versions \u003c V5.10.1), RUGGEDCOM RST916P (All versions \u003c V5.10.1). Affected devices do not properly validate input during the TLS certificate upload process of the web service. This could allow an authenticated remote attacker to trigger a device crash and reboot, leading to a temporary Denial of Service on the device.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20: Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"cec7a2ec-15b4-4faf-bd53-b40f371f3a77\", \"shortName\": \"siemens\", \"dateUpdated\": \"2025-12-09T10:44:34.649Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-40935\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-09T15:35:36.265Z\", \"dateReserved\": \"2025-04-16T09:06:15.878Z\", \"assignerOrgId\": \"cec7a2ec-15b4-4faf-bd53-b40f371f3a77\", \"datePublished\": \"2025-12-09T10:44:34.649Z\", \"assignerShortName\": \"siemens\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…