Impact
A flaw in the feature key installation process of Siemens RUGGEDCOM devices allows an authenticated remote attacker to supply unsanitized input that becomes part of an OS‑level command string, enabling the injection of arbitrary shell commands. This results in remote code execution with root privileges on the underlying operating system, giving the attacker full control over the device. The weakness is a classic command injection issue classified as CWE‑78.
Affected Systems
Affected systems include all Siemens RUGGEDCOM models listed in the CNA vendor/product list—MX5000, MX5000RE, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, and RX5000—across all versions earlier than V2.17.1.
Risk and Exploitability
The vulnerability is rated high with a CVSS score of 7.7. The EPSS score is not available, and the vulnerability is not currently listed in CISA’s KEV catalog. The likely attack vector requires that an attacker is authenticated on the system; from that point he can trigger the injection during the key‑installation routine and achieve remote code execution.
OpenCVE Enrichment