← Back to home
ICSA-25-044-06  ·  Published 2026-03-12  ·  View on CISA ICS-CERT ↗

Siemens RUGGEDCOM APE1808

CVSS 9.8 CRITICAL CISA KEV — Known Exploited

Remediations

  • Refer to Fortinet Blog for mitigation measures https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity
  • Update Fortigate NGFW to V7.4.7. Contact customer support to receive patch and update information
  • Use RADIUS over TLS (aka RADSEC) (https://fortiguard.fortinet.com/psirt/FG-IR-24-255)
  • For each interface, remove the fabric service or block CAPWAP-CONTROL access to port 5246 through a local-in policy (see https://fortiguard.fortinet.com/psirt/FG-IR-24-160)
  • Use alternate authentication mechanism such as PAP, MSCHAP, and CHAP configurations other than ASCII authentication (see https://www.fortiguard.com/psirt/FG-IR-24-472)

Affected Vendors

Siemens

Affected Products (4)

Siemens · RUGGEDCOM APE1808 vers:all/*
Siemens · RUGGEDCOM APE1808 vers:all/*
Siemens · RUGGEDCOM APE1808 vers:all/*
Siemens · RUGGEDCOM APE1808 vers:all/*

Affected Sectors

Critical Manufacturing

Get alerted to advisories like this

OTWarden monitors CISA, BSI, Siemens, Rockwell and more — and emails you within 2 hours when your vendors are affected.

Start free trial Learn more