PatchSiren cyber security CVE debrief
CVE-2025-33024 Siemens CVE debrief
CVE-2025-33024 is a critical command-injection issue in the tcpdump function of the web interface on affected Siemens RUGGEDCOM ROX devices. According to the supplied advisory text, a remote attacker with valid authentication could trigger arbitrary code execution with root privileges. Siemens lists a fix in version V2.16.5 or later for the affected product line.
- Vendor
- Siemens
- Product
- RUGGEDCOM ROX MX5000
- CVSS
- CRITICAL 9.9
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-05-13
- Original CVE updated
- 2025-11-11
- Advisory published
- 2025-05-13
- Advisory updated
- 2025-11-11
Who should care
Organizations operating Siemens RUGGEDCOM ROX devices, especially OT/industrial network teams, system administrators, and defenders responsible for remote management interfaces on the listed MX5000, MX5000RE, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, and RX5000 models.
Technical summary
The advisory describes missing server-side input sanitation in the tcpdump tool exposed through the web interface. The issue is reachable by an authenticated remote attacker and is rated CVSS 3.1 9.9/Critical with vector AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H. The stated impact is arbitrary code execution with root privileges. The supplied remediation is to update to V2.16.5 or later.
Defensive priority
Urgent. This is a network-reachable, authenticated remote code-execution path on industrial devices, with potential root-level impact. Prioritize patching, access restriction, and review of any exposed management interfaces.
Recommended defensive actions
- Update affected Siemens RUGGEDCOM ROX devices to V2.16.5 or later as directed in the vendor advisory.
- Restrict access to the web interface to trusted administrative networks and verify authentication controls.
- Review management-plane exposure, especially any remote access paths to the device web UI.
- Monitor for unexpected changes or activity associated with the device management interface.
- Coordinate remediation windows carefully in OT environments and validate firmware compatibility before deployment.
Evidence notes
All material claims are grounded in the supplied CISA CSAF advisory ICSA-25-135-17 and the linked Siemens advisory references. The source data lists the affected Siemens products, describes the tcpdump web-interface command injection condition, states the authenticated remote root-code-execution impact, and provides the fixed version. The supplied enrichment does not mark this CVE as a CISA KEV entry.
Official resources
-
CVE-2025-33024 CVE record
CVE.org
-
CVE-2025-33024 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Published by CISA on 2025-05-13 (ICSA-25-135-17 / CVE-2025-33024); the supplied source item was revised on 2025-11-11 for acknowledgements. The provided enrichment indicates this CVE is not a KEV entry.