PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-45490 Siemens CVE debrief

CVE-2024-45490 is a critical libexpat parsing flaw described by Siemens and CISA for affected industrial products, including RUGGEDCOM RST2428P (6GK6242-6PA00). The advisory states that xmlparse.c does not reject a negative length for XML_ParseBuffer in libexpat versions before 2.6.3. The published CVSS vector is 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), so organizations should treat exposed or operationally important installations as high priority. Siemens’ remediation guidance is to update to V3.1 or later for the affected products named in the advisory.

Vendor
Siemens
Product
RUGGEDCOM RST2428P (6GK6242-6PA00)
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-08-12
Original CVE updated
2026-02-25
Advisory published
2025-08-12
Advisory updated
2026-02-25

Who should care

Operators and maintainers of Siemens industrial products named in the advisory, especially RUGGEDCOM RST2428P deployments, should care most. Security teams that manage embedded third-party libraries such as libexpat in industrial control environments should also review their exposure.

Technical summary

The issue is in libexpat before 2.6.3: xmlparse.c does not reject a negative length passed to XML_ParseBuffer. Siemens and CISA map the issue to affected product lines in the SSA-613116 / ICSA-25-226-15 advisory set. The advisory includes product-specific remediation and later republication updates, indicating the affected-product list was refined over time.

Defensive priority

High

Recommended defensive actions

  • Upgrade affected Siemens products to V3.1 or later, following Siemens ProductCERT guidance.
  • Inventory any Siemens devices or embedded applications that bundle libexpat and confirm whether they are in an affected version range.
  • Prioritize internet-exposed or operationally critical installations for patching and validation.
  • Review the advisory revision history to ensure you are using the latest affected-product and remediation information.
  • Use standard ICS defense-in-depth practices to reduce exposure while patching is planned or underway.

Evidence notes

The source advisory was published on 2025-08-12 and later revised, with a final CISA republication update on 2026-02-25 based on Siemens ProductCERT SSA-613116. The advisory explicitly names RUGGEDCOM RST2428P (6GK6242-6PA00) and documents the underlying libexpat issue before 2.6.3. The published CVSS vector is 9.8 and the source bundle includes Siemens advisory links, the CISA ICS advisory, the CVE record, and ICS defensive-practices references.

Official resources

Publicly disclosed in the source advisory on 2025-08-12, with subsequent corrections and a final CISA republication update on 2026-02-25. This debrief uses the CVE publication date from the supplied timeline and advisory metadata, not the c