PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-33024 Siemens CVE debrief

CVE-2025-33024 is a critical command-injection issue in the tcpdump function of the web interface on affected Siemens RUGGEDCOM ROX devices. According to the supplied advisory text, a remote attacker with valid authentication could trigger arbitrary code execution with root privileges. Siemens lists a fix in version V2.16.5 or later for the affected product line.

Vendor
Siemens
Product
RUGGEDCOM ROX MX5000
CVSS
CRITICAL 9.9
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-13
Original CVE updated
2025-11-11
Advisory published
2025-05-13
Advisory updated
2025-11-11

Who should care

Organizations operating Siemens RUGGEDCOM ROX devices, especially OT/industrial network teams, system administrators, and defenders responsible for remote management interfaces on the listed MX5000, MX5000RE, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, and RX5000 models.

Technical summary

The advisory describes missing server-side input sanitation in the tcpdump tool exposed through the web interface. The issue is reachable by an authenticated remote attacker and is rated CVSS 3.1 9.9/Critical with vector AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H. The stated impact is arbitrary code execution with root privileges. The supplied remediation is to update to V2.16.5 or later.

Defensive priority

Urgent. This is a network-reachable, authenticated remote code-execution path on industrial devices, with potential root-level impact. Prioritize patching, access restriction, and review of any exposed management interfaces.

Recommended defensive actions

  • Update affected Siemens RUGGEDCOM ROX devices to V2.16.5 or later as directed in the vendor advisory.
  • Restrict access to the web interface to trusted administrative networks and verify authentication controls.
  • Review management-plane exposure, especially any remote access paths to the device web UI.
  • Monitor for unexpected changes or activity associated with the device management interface.
  • Coordinate remediation windows carefully in OT environments and validate firmware compatibility before deployment.

Evidence notes

All material claims are grounded in the supplied CISA CSAF advisory ICSA-25-135-17 and the linked Siemens advisory references. The source data lists the affected Siemens products, describes the tcpdump web-interface command injection condition, states the authenticated remote root-code-execution impact, and provides the fixed version. The supplied enrichment does not mark this CVE as a CISA KEV entry.

Official resources

Published by CISA on 2025-05-13 (ICSA-25-135-17 / CVE-2025-33024); the supplied source item was revised on 2025-11-11 for acknowledgements. The provided enrichment indicates this CVE is not a KEV entry.