PatchSiren cyber security CVE debrief
CVE-2024-56838 Siemens CVE debrief
CVE-2024-56838 affects Siemens RUGGEDCOM ROX II family devices through a SCEP client flaw in secure certificate enrollment. According to the CISA CSAF advisory, the client lacks validation of multiple fields, and an attacker could leverage that weakness to execute arbitrary code as the root user. Siemens lists an update to V2.17.0 or later as the remediation, and the issue is not marked as a CISA KEV inclusion in the provided data.
- Vendor
- Siemens
- Product
- RUGGEDCOM ROX II family
- CVSS
- HIGH 7.2
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-12-09
- Original CVE updated
- 2025-12-09
- Advisory published
- 2025-12-09
- Advisory updated
- 2025-12-09
Who should care
OT and industrial network teams using Siemens RUGGEDCOM ROX II family devices, especially administrators responsible for certificate enrollment, patching, and privileged access controls.
Technical summary
The advisory describes an input-validation failure in the device’s SCEP client used for secure certificate enrollment. Because the flaw can be reached in a way that enables arbitrary code execution with root privileges, the impact is severe even though the CVSS vector indicates that attacker privileges are required (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
Defensive priority
High. The issue can lead to root-level code execution on an industrial networking device, so remediation should be prioritized after identifying exposure and validating operational impact.
Recommended defensive actions
- Update Siemens RUGGEDCOM ROX II devices to V2.17.0 or later, per the vendor remediation.
- Inventory all RUGGEDCOM ROX II family deployments and confirm which devices use SCEP-based certificate enrollment.
- Restrict privileged administrative access to affected devices and review where high-privilege network paths are exposed.
- Schedule patching through a maintenance window and validate device behavior after the update.
- Follow Siemens advisory guidance and CISA industrial control system recommended practices for defense-in-depth.
Evidence notes
The source corpus is a CISA CSAF advisory for Siemens RUGGEDCOM ROX II with the description that the SCEP client lacks validation of multiple fields and may allow arbitrary code execution as root. The remediation field explicitly states to update to V2.17.0 or later. The provided enrichment marks the item as not in CISA KEV. The advisory references Siemens advisory SSA-912274 and the CISA ICS advisory page ICSA-26-015-11.
Official resources
-
CVE-2024-56838 CVE record
CVE.org
-
CVE-2024-56838 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed through CISA CSAF advisory ICSA-26-015-11 and Siemens advisory SSA-912274. The provided enrichment does not list the issue in CISA KEV.