PatchSiren cyber security CVE debrief
CVE-2024-56839 Siemens CVE debrief
CVE-2024-56839 affects Siemens RUGGEDCOM ROX II family devices when VRF (Virtual Routing and Forwarding) is in use. According to the supplied advisory text, an attacker could leverage this condition to achieve code injection and execute arbitrary code as root. The CVE was published on 2025-12-09 and is rated HIGH with CVSS 7.2.
- Vendor
- Siemens
- Product
- RUGGEDCOM ROX II family
- CVSS
- HIGH 7.2
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-12-09
- Original CVE updated
- 2025-12-09
- Advisory published
- 2025-12-09
- Advisory updated
- 2025-12-09
Who should care
OT/ICS operators, network administrators, and security teams responsible for Siemens RUGGEDCOM ROX II family deployments, especially systems where VRF is enabled.
Technical summary
The supplied CSAF advisory describes a code injection issue in the Siemens RUGGEDCOM ROX II family that is triggered when the affected device is using VRF. The CVSS vector is CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating network reachability but requiring high privileges. The stated impact is arbitrary code execution as root.
Defensive priority
High. The issue is remotely reachable, can lead to root-level execution, and affects an industrial networking product family. Prioritize devices confirmed to use VRF and move affected systems to the fixed release as soon as operationally feasible.
Recommended defensive actions
- Update affected Siemens RUGGEDCOM ROX II devices to V2.17.0 or later, per the vendor remediation.
- Identify ROX II deployments that use VRF so they can be prioritized for validation and remediation.
- Review Siemens advisory SSA-912274 and CISA advisory ICSA-26-015-11 for device-specific guidance and any deployment notes.
- Apply standard ICS defense-in-depth practices referenced by CISA while remediation is being planned and executed.
Evidence notes
All substantive claims in this debrief come from the supplied CISA CSAF metadata for ICSA-26-015-11 and its listed Siemens references. The advisory text states: 'Code injection can be achieved when the affected device is using VRF (Virtual Routing and Forwarding). An attacker could leverage this scenario to execute arbitrary code as root user.' The remediation listed in the corpus is 'Update to V2.17.0 or later version.' No KEV entry was supplied.
Official resources
-
CVE-2024-56839 CVE record
CVE.org
-
CVE-2024-56839 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed through the CISA CSAF advisory ICSA-26-015-11 and Siemens advisory SSA-912274, with the supplied CVE publication date of 2025-12-09. No Known Exploited Vulnerabilities listing was supplied.