March 14, 2023, midnight |

Siemens ProductCERT Security Advisories cert-portal.siemens.com

The SSH server on RUGGEDCOM ROS devices is configured to offer weak ciphers by default. This could allow an unauthorized attacker in a man-in-the-middle position to read and modify any data passed over the connection between legitimate clients and the affected device.


Siemens has released updates for the affected products and recommends to update to the latest versions.

attacker ciphers clients data default device devices encryption man-in-the-middle offer ros ruggedcom server siemens ssa ssh unauthorized update updates vulnerability

More from cert-portal.siemens.com / Siemens ProductCERT Security Advisories

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Senior Software Engineer, Security

@ Niantic | Zürich, Switzerland

Consultant expert en sécurité des systèmes industriels (H/F)

@ Devoteam | Levallois-Perret, France

Cybersecurity Analyst

@ Bally's | Providence, Rhode Island, United States

Digital Trust Cyber Defense Executive

@ KPMG India | Gurgaon, Haryana, India

Program Manager - Cybersecurity Assessment Services

@ TestPros | Remote (and DMV), DC