Siemens RUGGEDCOM ROX Devices Vulnerable to Remote Code Execution via Feature Key Injection (CVE-2025-40947)
CVE-2025-40947 describes a vulnerability in Siemens RUGGEDCOM ROX devices that allows authenticated remote attackers to inject arbitrary commands via a maliciously crafted feature key, resulting in remote code execution with root privileges.
A remote code execution vulnerability, tracked as CVE-2025-40947, affects multiple RUGGEDCOM ROX devices. The affected devices include RUGGEDCOM ROX MX5000, MX5000RE, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, and RX5000, specifically all versions prior to V2.17.1. The vulnerability stems from a failure to properly sanitize user-supplied input during the feature key installation process. An authenticated attacker can exploit this flaw to inject arbitrary commands, leading to remote code execution with root privileges on the underlying operating system. This vulnerability poses a significant risk to industrial control systems relying on these devices.
Attack Chain
- An attacker gains authenticated access to the RUGGEDCOM ROX device’s management interface.
- The attacker crafts a malicious feature key containing embedded operating system commands.
- The attacker uploads the crafted feature key to the device through the management interface.
- The RUGGEDCOM ROX device attempts to install the feature key without proper input sanitization.
- The injected commands within the feature key are executed with root privileges.
- The attacker gains arbitrary code execution on the device’s underlying operating system.
- The attacker can then establish persistence by modifying system files.
- The attacker can pivot to other internal assets, disrupt operations, or exfiltrate sensitive data.
Impact
Successful exploitation of CVE-2025-40947 allows an attacker to execute arbitrary code with root privileges on vulnerable RUGGEDCOM ROX devices. This could lead to complete system compromise, denial of service, disruption of critical infrastructure, and potential lateral movement to other systems within the network. The vulnerability targets industrial control systems, potentially impacting sectors such as energy, transportation, and manufacturing.
Recommendation
- Upgrade all affected RUGGEDCOM ROX devices (MX5000, MX5000RE, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, and RX5000) to version V2.17.1 or later to patch CVE-2025-40947.
- Monitor network traffic for suspicious activity related to feature key uploads to detect potential exploitation attempts. Deploy the Sigma rule
Detect Suspicious Feature Key Uploadsto identify such activity. - Review the logs for any unusual processes or commands executed on the RUGGEDCOM ROX devices that may indicate successful exploitation. Utilize the Sigma rule
Detect Malicious Command Execution via Feature Key Injectionfor this purpose.
Detection coverage 2
Detect Suspicious Feature Key Uploads
mediumDetects suspicious uploads of feature keys to RUGGEDCOM devices that may contain malicious code.
Detect Malicious Command Execution via Feature Key Injection
highDetects CVE-2025-40947 exploitation — execution of commands indicative of exploitation via feature key injection on RUGGEDCOM devices.
Detection queries are available on the platform. Get full rules →