Siemens Ruggedcom ROX Improper Validation of Specified Type of Input (CVE-2024-11168)

low Tenable OT Security Plugin ID 504900

Synopsis

The remote OT asset is affected by a vulnerability.

Description

he urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

https://cert-portal.siemens.com/productcert/html/ssa-202008.html

https://support.industry.siemens.com/cs/ww/en/view/109997648/

Plugin Details

Severity: Low

ID: 504900

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 1/9/2026

Updated: 1/9/2026

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v3

Risk Factor: Low

Base Score: 3.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Vulnerability Information

CPE: cpe:/o:siemens:ruggedcom_rox_rx1400_firmware, cpe:/o:siemens:ruggedcom_rox_rx5000_firmware, cpe:/o:siemens:ruggedcom_rox_rx1501_firmware, cpe:/o:siemens:ruggedcom_rox_rx1500_firmware, cpe:/o:siemens:ruggedcom_rox_rx1512_firmware, cpe:/o:siemens:ruggedcom_rox_mx5000_firmware, cpe:/o:siemens:ruggedcom_rox_mx5000re_firmware, cpe:/o:siemens:ruggedcom_rox_rx1536_firmware, cpe:/o:siemens:ruggedcom_rox_rx1524_firmware, cpe:/o:siemens:ruggedcom_rox_rx1510_firmware, cpe:/o:siemens:ruggedcom_rox_rx1511_firmware

Required KB Items: Tenable.ot/Siemens

Exploit Ease: No known exploits are available

Patch Publication Date: 12/9/2025

Vulnerability Publication Date: 12/9/2025

Reference Information

CVE: CVE-2024-11168

CWE: 1287