Upgrade Nozomi Guardian / CMC to V25.4.0. Using Web GUI might have errors and it is recommended to use the CLI for the upgrade. Contact customer support to receive patch and update information
Siemens has identified the following specific workarounds and mitigations that customers can apply to reduce the risk:
CVE-2024-13089
Only install update packages from trusted sources. Refer upstream advisory for further information.
CVE-2025-1501
Use internal firewall features to limit access to the web management interface. Refer upstream advisory for further information.
CVE-2025-3718
Use internal firewall features to limit access to the web management interface. Review all accounts with access to it and delete unnecessary ones
Apply care when opening untrusted links or visiting external websites while an authenticated session to the web management interface is established
CVE-2025-3719
Use internal firewall features to limit access to the web management interface. Review all accounts with access to it and delete unnecessary ones
CVE-2025-40885
Use internal firewall features to limit access to the web management interface. Review all accounts with access to it and delete unnecessary ones
CVE-2025-40886
Use internal firewall features to limit access to the web management interface. Review all accounts with access to it and delete unnecessary ones
CVE-2025-40887
Use internal firewall features to limit access to the web management interface. Review all accounts with access to it and delete unnecessary ones
CVE-2025-40888
Use internal firewall features to limit access to the web management interface. Review all accounts with access to it and delete unnecessary ones
CVE-2025-40889
Use internal firewall features to limit access to the web management interface. Review all accounts with access to it and delete unnecessary ones
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
PRODUCT DESCRIPTION
RUGGEDCOM APE1808 is a powerful utility-grade application hosting platform that lets you deploy a range of commercially available applications for edge computing and cybersecurity in harsh, industrial environments.
This chapter describes all vulnerabilities (CVE-IDs) addressed in this security advisory.
Wherever applicable, it also documents the product-specific impact of the individual vulnerabilities.
Vulnerability CVE-2024-13089
An OS command injection vulnerability within the update functionality may allow an authenticated administrator to execute unauthorized arbitrary OS commands. Users with administrative privileges may upload update packages to upgrade the versions of Nozomi Networks Guardian and CMC. While these updates are signed and their signatures are validated prior to installation, an improper signature validation check has been identified. This issue could potentially enable users to execute commands remotely on the appliance, thereby impacting confidentiality, integrity, and availability.
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Vulnerability CVE-2024-13090
A privilege escalation vulnerability may enable a service account to elevate its privileges. The sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account.
An access control vulnerability was discovered in the Request Trace and Download Trace functionalities of CMC before 25.1.0 due to a specific access restriction not being properly enforced for users with limited privileges. An authenticated user with limited privileges can request and download trace files due to improper access restrictions, potentially exposing unauthorized network data.
A client-side path traversal vulnerability was discovered in the web management interface front-end due to missing validation of an input parameter. An authenticated user with limited privileges can craft a malicious URL which, if visited by an authenticated victim, leads to a Cross-Site Scripting (XSS) attack.
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Vulnerability CVE-2025-3719
An access control vulnerability was discovered in the CLI functionality due to a specific access restriction not being properly enforced for users with limited privileges. An authenticated user with limited privileges can issue administrative CLI commands, altering the device configuration, and/or affecting its availability.
A SQL Injection vulnerability was discovered in the Smart Polling functionality due to improper validation of an input parameter. An authenticated user with limited privileges can execute arbitrary SELECT SQL statements on the DBMS used by the web application, potentially exposing unauthorized data.
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerability CVE-2025-40886
A SQL Injection vulnerability was discovered in the Alert functionality due to improper validation of an input parameter. An authenticated user with limited privileges can execute arbitrary SQL statements on the DBMS used by the web application, potentially exposing unauthorized data, altering their structure and content, and/or affecting their availability.
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerability CVE-2025-40887
A SQL Injection vulnerability was discovered in the Alert functionality due to improper validation of an input parameter. An authenticated user with limited privileges can execute arbitrary SELECT SQL statements on the DBMS used by the web application, potentially exposing unauthorized data.
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerability CVE-2025-40888
A SQL Injection vulnerability was discovered in the CLI functionality due to improper validation of an input parameter. An authenticated user with limited privileges can execute arbitrary SELECT SQL statements on the DBMS used by the web application, potentially exposing unauthorized data.
CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerability CVE-2025-40889
A path traversal vulnerability was discovered in the Time Machine functionality due to missing validation of two input parameters. An authenticated user with limited privileges, by issuing a specifically-crafted request, can potentially alter the structure and content of files in the /data folder, and/or affect their availability.
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
ADDITIONAL INFORMATION
Nozomi provides a public RSS feed for their security alerts to which customers can also subscribe [1].
[1] https://security.nozominetworks.com/alerts/
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT:
https://www.siemens.com/cert/advisories
HISTORY DATA
V1.0 (2025-08-12):
Publication Date
V1.1 (2025-10-14):
Added CVE-2025-1501, CVE-2025-40888, CVE-2025-3718, CVE-2025-3719, CVE-2025-40885, CVE-2025-40886, CVE-2025-40887 and CVE-2025-40889