PatchSiren cyber security CVE debrief
CVE-2025-58903 Siemens CVE debrief
CVE-2025-58903 is a low-CVSS availability issue in the supplied CISA/Siemens CSAF for Siemens RUGGEDCOM APE1808. The issue is described as an unchecked return value leading to a null pointer dereference that can crash the HTTP daemon when an authenticated user sends a specially crafted request. In operational environments, even a low-scoring denial-of-service issue can matter because it may disrupt device management or monitoring access. The supplied advisory data also contains internal inconsistencies: the vulnerability description and remediation text reference Fortinet FortiOS/Fortigate NGFW, while the product tree identifies Siemens RUGGEDCOM APE1808 as the affected product. Treat the Siemens ProductCERT/CISA advisory as the authoritative source and verify applicability before acting on version-specific remediation text.
- Vendor
- Siemens
- Product
- RUGGEDCOM APE1808
- CVSS
- LOW 2.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-05-13
- Original CVE updated
- 2026-02-12
- Advisory published
- 2025-05-13
- Advisory updated
- 2026-02-12
Who should care
OT/ICS operators, Siemens RUGGEDCOM APE1808 administrators, network/security teams responsible for industrial edge devices, and incident responders who need to assess availability impacts on management services.
Technical summary
The supplied record maps CVE-2025-58903 to a CWE-252 unchecked return value issue that can result in a null pointer dereference and crash of the HTTP daemon after an authenticated, specially crafted request. The CSAF product tree names Siemens RUGGEDCOM APE1808 as the affected product. The record’s descriptive text and remediation field conflict with that product mapping by naming Fortinet FortiOS/Fortigate NGFW, so the underlying applicability should be confirmed directly against the official Siemens advisory before relying on any version-specific fix details.
Defensive priority
Medium. The CVSS score is low, but the impact is service availability loss on an industrial/OT-facing device, which can still be operationally significant if management access or local services are disrupted.
Recommended defensive actions
- Review the official Siemens ProductCERT advisory (SSA-864900) and the CISA republished CSAF entry to confirm whether CVE-2025-58903 applies to your exact RUGGEDCOM APE1808 deployment.
- Validate any remediation version details against the official Siemens advisory before scheduling changes, because the supplied record contains product/remediation text inconsistencies.
- Restrict authenticated access to the device management interface to trusted administrative networks and users only.
- Monitor for unexpected HTTP daemon crashes, service restarts, or loss of management-plane availability on affected devices.
- Apply the vendor’s documented remediation and maintenance procedure once applicability is confirmed by the official advisory.
Evidence notes
The supplied source item is a CISA CSAF republication for ICSA-25-135-01 with publication date 2025-05-13 and latest republication update 2026-02-12. The product tree identifies Siemens RUGGEDCOM APE1808 as the affected product, and the advisory references Siemens ProductCERT SSA-864900. However, the description field says the issue is in Fortinet FortiOS 7.6.0 through 7.6.3 and before 7.4.8, and the remediation field says to update Fortigate NGFW to V7.4.9 or later. Those contradictions are present in the supplied corpus and should be treated as a source-quality issue rather than assumed facts about the Siemens product.
Official resources
-
CVE-2025-58903 CVE record
CVE.org
-
CVE-2025-58903 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Public advisory published 2025-05-13. The CISA republication was updated on 2026-02-12 based on Siemens ProductCERT SSA-864900.