PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-25250 Siemens CVE debrief

CVE-2025-25250 is a medium-severity information disclosure advisory in the supplied Siemens/CISA record. The advisory lists Siemens RUGGEDCOM APE1808 as the affected product and describes a situation where an authenticated user may access full SSL-VPN settings via a crafted URL. The source corpus also contains a notable product-text mismatch: the vulnerability description and remediation text reference FortiOS/Fortigate, so operators should validate applicability against Siemens ProductCERT SSA-864900 and CISA ICSA-25-135-01 before acting.

Vendor
Siemens
Product
RUGGEDCOM APE1808
CVSS
MEDIUM 4.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-13
Original CVE updated
2026-02-12
Advisory published
2025-05-13
Advisory updated
2026-02-12

Who should care

Operators and administrators of Siemens RUGGEDCOM APE1808 devices, especially environments that expose SSL-VPN or other authenticated remote-management interfaces. Security teams should also care if they rely on vendor advisories for patch planning, because the supplied record contains inconsistent product naming that needs validation.

Technical summary

The record describes a CWE-200 exposure of sensitive information where an authenticated user could access full SSL-VPN settings through a crafted URL. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RC:R, which aligns with limited confidentiality impact and no stated integrity or availability impact. The advisory metadata names Siemens RUGGEDCOM APE1808 as the affected product, while the vulnerability text references FortiOS SSL-VPN web-mode; that inconsistency should be resolved through the official Siemens and CISA advisories before remediation.

Defensive priority

Medium

Recommended defensive actions

  • Confirm whether your deployment matches the Siemens RUGGEDCOM APE1808 advisory scope before making changes; the supplied record contains a FortiOS/Fortigate text mismatch.
  • Review Siemens ProductCERT SSA-864900 and CISA ICSA-25-135-01 for the authoritative fix and any product-specific remediation steps.
  • Apply the vendor-recommended update or workaround only after confirming the exact affected version and platform.
  • Restrict access to authenticated management and SSL-VPN interfaces to trusted networks and users, and enforce least privilege where possible.
  • Review logs for unusual access to SSL-VPN configuration pages or attempts to retrieve sensitive settings.
  • If the device cannot be immediately updated, use compensating controls from official CISA industrial control systems guidance and vendor hardening recommendations.

Evidence notes

Supplied source data identifies CVE-2025-25250 in CISA CSAF ICSA-25-135-01 with affected product Siemens RUGGEDCOM APE1808 and publication date 2025-05-13. The revision history shows later republication and remediation updates through 2026-02-12. The same source corpus includes a description and remediation string that reference FortiOS/Fortigate SSL-VPN web-mode, which conflicts with the Siemens product scope and should be treated as a source inconsistency rather than an established fact about the Siemens device.

Official resources

Publicly disclosed on 2025-05-13 in the supplied CISA/Siemens advisory record, with subsequent republication and remediation updates through 2026-02-12. No KEV listing is indicated in the provided data.