PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-33025 Siemens CVE debrief

CVE-2025-33025 is a critical command-injection issue in the web interface traceroute function of affected Siemens RUGGEDCOM ROX devices. Because the flaw can be used by an authenticated remote attacker to execute arbitrary code with root privileges, it should be treated as an urgent patching priority.

Vendor
Siemens
Product
RUGGEDCOM ROX MX5000
CVSS
CRITICAL 9.9
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-13
Original CVE updated
2025-11-11
Advisory published
2025-05-13
Advisory updated
2025-11-11

Who should care

Organizations running Siemens RUGGEDCOM ROX MX5000, MX5000RE, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, or RX5000 devices, especially teams managing industrial or operational technology environments.

Technical summary

According to the CISA CSAF advisory and Siemens references, the web-interface traceroute tool lacks server-side input sanitation. That allows command injection from an authenticated remote session, with the potential for arbitrary code execution as root on affected devices. Siemens lists remediation as updating to V2.16.5 or later.

Defensive priority

Critical. Prioritize immediate remediation for any exposed or remotely managed affected device, with special attention to systems reachable through administrative web access.

Recommended defensive actions

  • Verify whether any Siemens RUGGEDCOM ROX devices in your environment match the affected product list.
  • Upgrade affected devices to Siemens version V2.16.5 or later using the vendor remediation guidance.
  • Restrict web-interface access to trusted management networks and administrative accounts only.
  • Review authentication controls and monitoring around device administration to detect unexpected web-session activity.
  • If patching must be delayed, apply compensating controls from CISA industrial control system defense-in-depth and recommended practices.

Evidence notes

Primary evidence comes from CISA advisory ICSA-25-135-17, published 2025-05-13 and modified 2025-11-11, and the linked Siemens advisory/release materials. The advisory explicitly names the affected Siemens RUGGEDCOM ROX products, describes the traceroute command-injection condition, and states that an authenticated remote attacker could execute arbitrary code with root privileges. The advisory also cites remediation to V2.16.5 or later.

Official resources

Publicly disclosed on 2025-05-13 through CISA advisory ICSA-25-135-17 and Siemens advisory materials; CISA updated the advisory on 2025-11-11.