Description
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGEDCOM ROX RX1501 (All versions < V2.17.1), RUGGEDCOM ROX RX1510 (All versions < V2.17.1), RUGGEDCOM ROX RX1511 (All versions < V2.17.1), RUGGEDCOM ROX RX1512 (All versions < V2.17.1), RUGGEDCOM ROX RX1524 (All versions < V2.17.1), RUGGEDCOM ROX RX1536 (All versions < V2.17.1), RUGGEDCOM ROX RX5000 (All versions < V2.17.1). Affected devices do not properly sanitize user-supplied input during the feature key installation process.

This could allow an authenticated remote attacker to inject arbitrary commands, resulting in remote code execution with root privileges on the underlying operating system.
Published: 2026-05-12
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the feature key installation process of Siemens RUGGEDCOM devices allows an authenticated remote attacker to supply unsanitized input that becomes part of an OS‑level command string, enabling the injection of arbitrary shell commands. This results in remote code execution with root privileges on the underlying operating system, giving the attacker full control over the device. The weakness is a classic command injection issue classified as CWE‑78.

Affected Systems

Affected systems include all Siemens RUGGEDCOM models listed in the CNA vendor/product list—MX5000, MX5000RE, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, and RX5000—across all versions earlier than V2.17.1.

Risk and Exploitability

The vulnerability is rated high with a CVSS score of 7.7. The EPSS score is not available, and the vulnerability is not currently listed in CISA’s KEV catalog. The likely attack vector requires that an attacker is authenticated on the system; from that point he can trigger the injection during the key‑installation routine and achieve remote code execution.

Generated by OpenCVE AI on May 12, 2026 at 10:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade all affected RUGGEDCOM devices to version V2.17.1 or later.
  • Disable the feature key installation capability if it is not required for device operation.
  • If upgrade is not immediately possible, restrict access to the function to only trusted administrators and enforce strict input validation on the feature key data to prevent command injection.

Generated by OpenCVE AI on May 12, 2026 at 10:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Siemens
Siemens ruggedcom Rox Mx5000
Siemens ruggedcom Rox Mx5000re
Siemens ruggedcom Rox Rx1400
Siemens ruggedcom Rox Rx1500
Siemens ruggedcom Rox Rx1501
Siemens ruggedcom Rox Rx1510
Siemens ruggedcom Rox Rx1511
Siemens ruggedcom Rox Rx1512
Siemens ruggedcom Rox Rx1524
Siemens ruggedcom Rox Rx1536
Siemens ruggedcom Rox Rx5000
Vendors & Products Siemens
Siemens ruggedcom Rox Mx5000
Siemens ruggedcom Rox Mx5000re
Siemens ruggedcom Rox Rx1400
Siemens ruggedcom Rox Rx1500
Siemens ruggedcom Rox Rx1501
Siemens ruggedcom Rox Rx1510
Siemens ruggedcom Rox Rx1511
Siemens ruggedcom Rox Rx1512
Siemens ruggedcom Rox Rx1524
Siemens ruggedcom Rox Rx1536
Siemens ruggedcom Rox Rx5000

Tue, 12 May 2026 10:45:00 +0000

Type Values Removed Values Added
Title Remote Code Execution via Unsanitized Input During Feature Key Installation in Siemens RUGGEDCOM Devices

Tue, 12 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGEDCOM ROX RX1501 (All versions < V2.17.1), RUGGEDCOM ROX RX1510 (All versions < V2.17.1), RUGGEDCOM ROX RX1511 (All versions < V2.17.1), RUGGEDCOM ROX RX1512 (All versions < V2.17.1), RUGGEDCOM ROX RX1524 (All versions < V2.17.1), RUGGEDCOM ROX RX1536 (All versions < V2.17.1), RUGGEDCOM ROX RX5000 (All versions < V2.17.1). Affected devices do not properly sanitize user-supplied input during the feature key installation process. This could allow an authenticated remote attacker to inject arbitrary commands, resulting in remote code execution with root privileges on the underlying operating system.
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Siemens Ruggedcom Rox Mx5000 Ruggedcom Rox Mx5000re Ruggedcom Rox Rx1400 Ruggedcom Rox Rx1500 Ruggedcom Rox Rx1501 Ruggedcom Rox Rx1510 Ruggedcom Rox Rx1511 Ruggedcom Rox Rx1512 Ruggedcom Rox Rx1524 Ruggedcom Rox Rx1536 Ruggedcom Rox Rx5000
cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2026-05-12T12:45:37.589Z

Reserved: 2025-04-16T09:06:15.879Z

Link: CVE-2025-40947

cve-icon Vulnrichment

Updated: 2026-05-12T12:45:30.108Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T10:16:43.053

Modified: 2026-05-12T14:19:41.400

Link: CVE-2025-40947

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T10:45:13Z

Weaknesses