{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-40935","assignerOrgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","state":"PUBLISHED","assignerShortName":"siemens","dateReserved":"2025-04-16T09:06:15.878Z","datePublished":"2025-12-09T10:44:34.649Z","dateUpdated":"2025-12-09T15:35:36.265Z"},"containers":{"cna":{"providerMetadata":{"orgId":"cec7a2ec-15b4-4faf-bd53-b40f371f3a77","shortName":"siemens","dateUpdated":"2025-12-09T10:44:34.649Z"},"descriptions":[{"lang":"en","value":"A vulnerability has been identified in RUGGEDCOM RMC8388 V5.X (All versions < V5.10.1), RUGGEDCOM RS416Pv2 V5.X (All versions < V5.10.1), RUGGEDCOM RS416v2 V5.X (All versions < V5.10.1), RUGGEDCOM RS900 (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RS900G (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RSG2100 (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RSG2100P (32M) V5.X (All versions < V5.10.1), RUGGEDCOM RSG2288 V5.X (All versions < V5.10.1), RUGGEDCOM RSG2300 V5.X (All versions < V5.10.1), RUGGEDCOM RSG2300P V5.X (All versions < V5.10.1), RUGGEDCOM RSG2488 V5.X (All versions < V5.10.1), RUGGEDCOM RSG907R (All versions < V5.10.1), RUGGEDCOM RSG908C (All versions < V5.10.1), RUGGEDCOM RSG909R (All versions < V5.10.1), RUGGEDCOM RSG910C (All versions < V5.10.1), RUGGEDCOM RSG920P V5.X (All versions < V5.10.1), RUGGEDCOM RSL910 (All versions < V5.10.1), RUGGEDCOM RST2228 (All versions < V5.10.1), RUGGEDCOM RST2228P (All versions < V5.10.1), RUGGEDCOM RST916C (All versions < V5.10.1), RUGGEDCOM RST916P (All versions < V5.10.1). Affected devices do not properly validate input during the TLS certificate upload process of the web service. This could allow an authenticated remote attacker to trigger a device crash and reboot, leading to a temporary Denial of Service on the device."}],"affected":[{"vendor":"Siemens","product":"RUGGEDCOM RMC8388 V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RS416Pv2 V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RS416v2 V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RS900 (32M) V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RS900G (32M) V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSG2100 (32M) V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSG2100P (32M) V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSG2288 V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSG2300 V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSG2300P V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSG2488 V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSG907R","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSG908C","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSG909R","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSG910C","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSG920P V5.X","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RSL910","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RST2228","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RST2228P","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RST916C","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"},{"vendor":"Siemens","product":"RUGGEDCOM RST916P","versions":[{"status":"affected","version":"0","lessThan":"V5.10.1","versionType":"custom"}],"defaultStatus":"unknown"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM"}},{"cvssV4_0":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","baseScore":5.3,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-20","description":"CWE-20: Improper Input Validation","type":"CWE"}]}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-763474.html"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-09T15:34:03.895420Z","id":"CVE-2025-40935","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-09T15:35:36.265Z"}}]}}