PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-56839 Siemens CVE debrief

CVE-2024-56839 affects Siemens RUGGEDCOM ROX II family devices when VRF (Virtual Routing and Forwarding) is in use. According to the supplied advisory text, an attacker could leverage this condition to achieve code injection and execute arbitrary code as root. The CVE was published on 2025-12-09 and is rated HIGH with CVSS 7.2.

Vendor
Siemens
Product
RUGGEDCOM ROX II family
CVSS
HIGH 7.2
CISA KEV
Not listed in stored evidence
Original CVE published
2025-12-09
Original CVE updated
2025-12-09
Advisory published
2025-12-09
Advisory updated
2025-12-09

Who should care

OT/ICS operators, network administrators, and security teams responsible for Siemens RUGGEDCOM ROX II family deployments, especially systems where VRF is enabled.

Technical summary

The supplied CSAF advisory describes a code injection issue in the Siemens RUGGEDCOM ROX II family that is triggered when the affected device is using VRF. The CVSS vector is CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating network reachability but requiring high privileges. The stated impact is arbitrary code execution as root.

Defensive priority

High. The issue is remotely reachable, can lead to root-level execution, and affects an industrial networking product family. Prioritize devices confirmed to use VRF and move affected systems to the fixed release as soon as operationally feasible.

Recommended defensive actions

  • Update affected Siemens RUGGEDCOM ROX II devices to V2.17.0 or later, per the vendor remediation.
  • Identify ROX II deployments that use VRF so they can be prioritized for validation and remediation.
  • Review Siemens advisory SSA-912274 and CISA advisory ICSA-26-015-11 for device-specific guidance and any deployment notes.
  • Apply standard ICS defense-in-depth practices referenced by CISA while remediation is being planned and executed.

Evidence notes

All substantive claims in this debrief come from the supplied CISA CSAF metadata for ICSA-26-015-11 and its listed Siemens references. The advisory text states: 'Code injection can be achieved when the affected device is using VRF (Virtual Routing and Forwarding). An attacker could leverage this scenario to execute arbitrary code as root user.' The remediation listed in the corpus is 'Update to V2.17.0 or later version.' No KEV entry was supplied.

Official resources

Publicly disclosed through the CISA CSAF advisory ICSA-26-015-11 and Siemens advisory SSA-912274, with the supplied CVE publication date of 2025-12-09. No Known Exploited Vulnerabilities listing was supplied.