PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-22862 Siemens CVE debrief

CVE-2025-22862 was published on 2025-05-13 in CISA's CSAF advisory ICSA-25-135-01 and later republished on 2026-02-12. The advisory data associates the issue with Siemens RUGGEDCOM APE1808, but the vulnerability description text refers to FortiOS/FortiProxy and an Automation Stitch webhook path, and the remediation text references Fortigate NGFW. Because the supplied source corpus is internally inconsistent, treat applicability as advisory-only until confirmed against the Siemens ProductCERT materials.

Vendor
Siemens
Product
RUGGEDCOM APE1808
CVSS
MEDIUM 6.7
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-13
Original CVE updated
2026-02-12
Advisory published
2025-05-13
Advisory updated
2026-02-12

Who should care

Operators, integrators, and asset owners responsible for Siemens RUGGEDCOM APE1808 in OT/ICS environments, plus vulnerability-management teams that track CISA CSAF advisories and vendor republished guidance.

Technical summary

The source description characterizes CVE-2025-22862 as an authentication-bypass / alternate-path-or-channel issue that could let an authenticated attacker elevate privileges by triggering a malicious Webhook action in an Automation Stitch component. The advisory metadata, however, maps the CVE to Siemens RUGGEDCOM APE1808, while the remediation field calls for updating Fortigate NGFW to V7.4.9 or later. That mismatch means the source should be cross-checked against the linked Siemens and CISA advisories before any change is applied.

Defensive priority

Medium. The CVSS score is 6.7 (Medium), but OT/ICS context and the possibility of privilege escalation make validation and patch planning important.

Recommended defensive actions

  • Verify applicability against the linked Siemens ProductCERT advisory and the CISA CSAF record before scheduling remediation.
  • If your environment matches the affected Siemens product and the vendor guidance is confirmed, follow the supplied secure update recommendation procedure and apply the documented fixed version or later.
  • Contact customer support as directed in the remediation guidance to obtain the detailed update path for the affected product.
  • Use CISA ICS recommended practices and defense-in-depth guidance to reduce exposure while remediation is validated.

Evidence notes

This debrief is based only on the supplied CSAF source item and official reference links. The source corpus contains a notable inconsistency: the advisory metadata names Siemens RUGGEDCOM APE1808, but the vulnerability description mentions FortiOS/FortiProxy and the remediation mentions Fortigate NGFW. Those conflicting product details are preserved here rather than reconciled.

Official resources

Publicly disclosed in CISA CSAF advisory ICSA-25-135-01 on 2025-05-13, with subsequent republication updates; latest supplied update date is 2026-02-12.