SB2024120609 - Multiple vulnerabilities in Siemens RUGGEDCOM APE1808



SB2024120609 - Multiple vulnerabilities in Siemens RUGGEDCOM APE1808

Published: December 6, 2024 Updated: June 13, 2025

Security Bulletin ID SB2024120609
Severity
Critical
Patch available
NO
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 25% High 25% Medium 25% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) NULL pointer dereference (CVE-ID: CVE-2024-2550)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can send specially crafted packets to the device and crash the GlobalProtect service.


2) Improper authentication (CVE-ID: CVE-2024-0012)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to improper authentication in the Management Web Interface. A remote non-authenticated attacker can bypass authentication process and gain unauthorized access to the system.

Note, the vulnerability is being actively exploited in the wild in conjunction with #VU100528 (CVE-2024-9474).


3) Path traversal (CVE-ID: CVE-2024-2552)

The vulnerability allows a local user to delete arbitrary files on the system.

The vulnerability exists due to input validation error when processing directory traversal sequences in CLI. A local privileged user can delete arbitrary files on the system.


4) OS Command Injection (CVE-ID: CVE-2024-9474)

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to an unspecified vulnerability related to improper input validation within the management interface. A remote user can send a specially crafted request to the system and execute arbitrary OS commands.

Note, the vulnerability is being actively exploited in the wild.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.