PatchSiren cyber security CVE debrief
CVE-2025-25250 Siemens CVE debrief
CVE-2025-25250 is a medium-severity information disclosure advisory in the supplied Siemens/CISA record. The advisory lists Siemens RUGGEDCOM APE1808 as the affected product and describes a situation where an authenticated user may access full SSL-VPN settings via a crafted URL. The source corpus also contains a notable product-text mismatch: the vulnerability description and remediation text reference FortiOS/Fortigate, so operators should validate applicability against Siemens ProductCERT SSA-864900 and CISA ICSA-25-135-01 before acting.
- Vendor
- Siemens
- Product
- RUGGEDCOM APE1808
- CVSS
- MEDIUM 4.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-05-13
- Original CVE updated
- 2026-02-12
- Advisory published
- 2025-05-13
- Advisory updated
- 2026-02-12
Who should care
Operators and administrators of Siemens RUGGEDCOM APE1808 devices, especially environments that expose SSL-VPN or other authenticated remote-management interfaces. Security teams should also care if they rely on vendor advisories for patch planning, because the supplied record contains inconsistent product naming that needs validation.
Technical summary
The record describes a CWE-200 exposure of sensitive information where an authenticated user could access full SSL-VPN settings through a crafted URL. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RC:R, which aligns with limited confidentiality impact and no stated integrity or availability impact. The advisory metadata names Siemens RUGGEDCOM APE1808 as the affected product, while the vulnerability text references FortiOS SSL-VPN web-mode; that inconsistency should be resolved through the official Siemens and CISA advisories before remediation.
Defensive priority
Medium
Recommended defensive actions
- Confirm whether your deployment matches the Siemens RUGGEDCOM APE1808 advisory scope before making changes; the supplied record contains a FortiOS/Fortigate text mismatch.
- Review Siemens ProductCERT SSA-864900 and CISA ICSA-25-135-01 for the authoritative fix and any product-specific remediation steps.
- Apply the vendor-recommended update or workaround only after confirming the exact affected version and platform.
- Restrict access to authenticated management and SSL-VPN interfaces to trusted networks and users, and enforce least privilege where possible.
- Review logs for unusual access to SSL-VPN configuration pages or attempts to retrieve sensitive settings.
- If the device cannot be immediately updated, use compensating controls from official CISA industrial control systems guidance and vendor hardening recommendations.
Evidence notes
Supplied source data identifies CVE-2025-25250 in CISA CSAF ICSA-25-135-01 with affected product Siemens RUGGEDCOM APE1808 and publication date 2025-05-13. The revision history shows later republication and remediation updates through 2026-02-12. The same source corpus includes a description and remediation string that reference FortiOS/Fortigate SSL-VPN web-mode, which conflicts with the Siemens product scope and should be treated as a source inconsistency rather than an established fact about the Siemens device.
Official resources
-
CVE-2025-25250 CVE record
CVE.org
-
CVE-2025-25250 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed on 2025-05-13 in the supplied CISA/Siemens advisory record, with subsequent republication and remediation updates through 2026-02-12. No KEV listing is indicated in the provided data.