Siemens RUGGEDCOM CROSSBOW Station Access Controller (SAC)
Severity: Low · Kind: Advisory
We've ingested this item but haven't summarised it yet. Read the upstream advisory using the link below in the meantime — the AI summary will appear here once the next run completes.
From the source
View CSAF Summary RUGGEDCOM CROSSBOW Station Access Controller (SAC) contains a vulnerability that could allow an attacker to achieve arbitrary code execution and to create a denial of service condition. Siemens has released a new version for RUGGEDCOM CROSSBOW Station Access Controller (SAC) and recommends to update to the latest version. The following versions of Siemens RUGGEDCOM CROSSBOW Station Access Controller (SAC) are affected: RUGGEDCOM CROSSBOW Station Access Controller (SAC) vers:intdot/<5.8 (CVE-2025-6965) CVSS Vendor Equipment Vulnerabilities v3 7.7 Siemens Siemens RUGGEDCOM CROSSBOW Station Access Controller (SAC) Numeric Truncation Error Background Critical Infrastructure Sectors: Critical Manufacturing Countries/Areas Deployed: Worldwide Company Headquarters Location: Germany Vulnerabilities Expand All + CVE-2025-6965 There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above. View CVE Details Affected Products Siemens RUGGEDCOM CROSSBOW Station Access Controller (SAC) Vendor: Siemens Product Version: RUGGEDCOM CROSSBOW Station Access Controller (SAC) Product Status: known_affected Remediations Vendor fix Update to V5.8 or later version https://support.industry.siemens.com/cs/ww/en/view/110000841/ Relevant CWE: CWE-197 Numeric Truncation Error Metrics CVSS Version Base Score Base S
Was this useful?
Plain-English summaries are AI-generated and reviewed for tone, not technical accuracy. For incident response, always rely on the original source linked above.