PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-58903 Siemens CVE debrief

CVE-2025-58903 is a low-CVSS availability issue in the supplied CISA/Siemens CSAF for Siemens RUGGEDCOM APE1808. The issue is described as an unchecked return value leading to a null pointer dereference that can crash the HTTP daemon when an authenticated user sends a specially crafted request. In operational environments, even a low-scoring denial-of-service issue can matter because it may disrupt device management or monitoring access. The supplied advisory data also contains internal inconsistencies: the vulnerability description and remediation text reference Fortinet FortiOS/Fortigate NGFW, while the product tree identifies Siemens RUGGEDCOM APE1808 as the affected product. Treat the Siemens ProductCERT/CISA advisory as the authoritative source and verify applicability before acting on version-specific remediation text.

Vendor
Siemens
Product
RUGGEDCOM APE1808
CVSS
LOW 2.7
CISA KEV
Not listed in stored evidence
Original CVE published
2025-05-13
Original CVE updated
2026-02-12
Advisory published
2025-05-13
Advisory updated
2026-02-12

Who should care

OT/ICS operators, Siemens RUGGEDCOM APE1808 administrators, network/security teams responsible for industrial edge devices, and incident responders who need to assess availability impacts on management services.

Technical summary

The supplied record maps CVE-2025-58903 to a CWE-252 unchecked return value issue that can result in a null pointer dereference and crash of the HTTP daemon after an authenticated, specially crafted request. The CSAF product tree names Siemens RUGGEDCOM APE1808 as the affected product. The record’s descriptive text and remediation field conflict with that product mapping by naming Fortinet FortiOS/Fortigate NGFW, so the underlying applicability should be confirmed directly against the official Siemens advisory before relying on any version-specific fix details.

Defensive priority

Medium. The CVSS score is low, but the impact is service availability loss on an industrial/OT-facing device, which can still be operationally significant if management access or local services are disrupted.

Recommended defensive actions

  • Review the official Siemens ProductCERT advisory (SSA-864900) and the CISA republished CSAF entry to confirm whether CVE-2025-58903 applies to your exact RUGGEDCOM APE1808 deployment.
  • Validate any remediation version details against the official Siemens advisory before scheduling changes, because the supplied record contains product/remediation text inconsistencies.
  • Restrict authenticated access to the device management interface to trusted administrative networks and users only.
  • Monitor for unexpected HTTP daemon crashes, service restarts, or loss of management-plane availability on affected devices.
  • Apply the vendor’s documented remediation and maintenance procedure once applicability is confirmed by the official advisory.

Evidence notes

The supplied source item is a CISA CSAF republication for ICSA-25-135-01 with publication date 2025-05-13 and latest republication update 2026-02-12. The product tree identifies Siemens RUGGEDCOM APE1808 as the affected product, and the advisory references Siemens ProductCERT SSA-864900. However, the description field says the issue is in Fortinet FortiOS 7.6.0 through 7.6.3 and before 7.4.8, and the remediation field says to update Fortigate NGFW to V7.4.9 or later. Those contradictions are present in the supplied corpus and should be treated as a source-quality issue rather than assumed facts about the Siemens product.

Official resources

Public advisory published 2025-05-13. The CISA republication was updated on 2026-02-12 based on Siemens ProductCERT SSA-864900.