All versions with Palo Alto Networks Virtual NGFW with an enabled GlobalProtect gateway or portal affected byCVE-2025-0133
Contact customer support to receive patch and update information
All versions with Palo Alto Networks Virtual NGFW with an SD-WAN Interface Profile configured with Direct Internet Access (DIA) affected byCVE-2025-4229
Contact customer support to receive patch and update information
All versions with Palo Alto Networks Virtual NGFWaffected bymultiple CVEs
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
PRODUCT DESCRIPTION
RUGGEDCOM APE1808 is a powerful utility-grade application hosting platform that lets you deploy a range of commercially available applications for edge computing and cybersecurity in harsh, industrial environments.
This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory.
Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.
Vulnerability CVE-2025-0133
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link. The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN.
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Vulnerability CVE-2025-4229
An information disclosure vulnerability in the SD-WAN feature of Palo Alto Networks PAN-OS® software enables an unauthorized user to view unencrypted data sent from the firewall through the SD-WAN interface. This requires the user to be able to intercept packets sent from the firewall.
CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Vulnerability CVE-2025-4230
A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Vulnerability CVE-2025-4614
An information disclosure vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to view session tokens of users authenticated to the firewall web UI. This may allow impersonation of users whose session tokens are leaked.
CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Vulnerability CVE-2025-4615
An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and execute arbitrary commands.
CWE-83: Improper Neutralization of Script in Attributes in a Web Page
ADDITIONAL INFORMATION
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT:
https://www.siemens.com/cert/advisories