PatchSiren cyber security CVE debrief
CVE-2025-22862 Siemens CVE debrief
CVE-2025-22862 was published on 2025-05-13 in CISA's CSAF advisory ICSA-25-135-01 and later republished on 2026-02-12. The advisory data associates the issue with Siemens RUGGEDCOM APE1808, but the vulnerability description text refers to FortiOS/FortiProxy and an Automation Stitch webhook path, and the remediation text references Fortigate NGFW. Because the supplied source corpus is internally inconsistent, treat applicability as advisory-only until confirmed against the Siemens ProductCERT materials.
- Vendor
- Siemens
- Product
- RUGGEDCOM APE1808
- CVSS
- MEDIUM 6.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-05-13
- Original CVE updated
- 2026-02-12
- Advisory published
- 2025-05-13
- Advisory updated
- 2026-02-12
Who should care
Operators, integrators, and asset owners responsible for Siemens RUGGEDCOM APE1808 in OT/ICS environments, plus vulnerability-management teams that track CISA CSAF advisories and vendor republished guidance.
Technical summary
The source description characterizes CVE-2025-22862 as an authentication-bypass / alternate-path-or-channel issue that could let an authenticated attacker elevate privileges by triggering a malicious Webhook action in an Automation Stitch component. The advisory metadata, however, maps the CVE to Siemens RUGGEDCOM APE1808, while the remediation field calls for updating Fortigate NGFW to V7.4.9 or later. That mismatch means the source should be cross-checked against the linked Siemens and CISA advisories before any change is applied.
Defensive priority
Medium. The CVSS score is 6.7 (Medium), but OT/ICS context and the possibility of privilege escalation make validation and patch planning important.
Recommended defensive actions
- Verify applicability against the linked Siemens ProductCERT advisory and the CISA CSAF record before scheduling remediation.
- If your environment matches the affected Siemens product and the vendor guidance is confirmed, follow the supplied secure update recommendation procedure and apply the documented fixed version or later.
- Contact customer support as directed in the remediation guidance to obtain the detailed update path for the affected product.
- Use CISA ICS recommended practices and defense-in-depth guidance to reduce exposure while remediation is validated.
Evidence notes
This debrief is based only on the supplied CSAF source item and official reference links. The source corpus contains a notable inconsistency: the advisory metadata names Siemens RUGGEDCOM APE1808, but the vulnerability description mentions FortiOS/FortiProxy and the remediation mentions Fortigate NGFW. Those conflicting product details are preserved here rather than reconciled.
Official resources
-
CVE-2025-22862 CVE record
CVE.org
-
CVE-2025-22862 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in CISA CSAF advisory ICSA-25-135-01 on 2025-05-13, with subsequent republication updates; latest supplied update date is 2026-02-12.