Impact
This vulnerability stems from improper input validation in the web server’s JSON‑RPC interface on Siemens RUGGEDCOM devices. The flaw allows an authenticated remote attacker to read files from the underlying operating system with root privileges, effectively granting elevated access and confidentiality compromise. The weakness is classified as CWE‑88 – Incorrect Access Control.
Affected Systems
Affected products include Siemens RUGGEDCOM ROX MX5000, MX5000RE, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, and RX5000. All firmware versions older than V2.17.1 are vulnerable.
Risk and Exploitability
The CVSS score of 6.1 indicates moderate severity. EPSS data is not available, and the vulnerability has not been listed in the CISA KEV catalog. The attack requires authentication and remote access to the JSON‑RPC endpoint, making it exploitable against systems exposed to untrusted networks and with weak credential policies.
OpenCVE Enrichment