Siemens SCALANCE and RUGGEDCOM Devices Improper Input Validation (CVE-2024-41090)

high Tenable OT Security Plugin ID 504768

Synopsis

The remote OT asset is affected by a vulnerability.

Description

tap: add missing verification for short frame. Missing to check against the validity of the frame length in the tap_get_user_xdp() path, which could cause a corrupted skb to be sent downstack. Even before the skb is transmitted, the tap_get_user_xdp()-->skb_set_network_header() may assume the size is more than ETH_HLEN. Once transmitted, this could either cause out-of- bound access beyond the actual length, or confuse the underlayer with incorrect or inconsistent header length in the skb metadata.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://cert-portal.siemens.com/productcert/html/ssa-355557.html

https://support.industry.siemens.com/cs/ww/en/view/109988839/

Plugin Details

Severity: High

ID: 504768

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 11/18/2025

Updated: 11/18/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v3

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.2

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:siemens:scalance_xr-500_series_firmware, cpe:/o:siemens:scalance_xr-300_series_firmware, cpe:/o:siemens:ruggedcom_rst2428p_firmware:3.2, cpe:/o:siemens:scalance_xrh-300_series_firmware, cpe:/o:siemens:scalance_xc-300_series_firmware, cpe:/o:siemens:scalance_xc-400_series_firmware, cpe:/o:siemens:scalance_xch-300_series_firmware, cpe:/o:siemens:scalance_xrm-300_series_firmware, cpe:/o:siemens:scalance_xcm-300_series_firmware, cpe:/o:siemens:scalance_xr-500wg_series_firmware

Required KB Items: Tenable.ot/Siemens

Exploit Ease: No known exploits are available

Patch Publication Date: 8/12/2025

Vulnerability Publication Date: 8/12/2025

Reference Information

CVE: CVE-2024-41090

CWE: 20